Analysis

  • max time kernel
    210s
  • max time network
    211s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 12:34

General

  • Target

    97a997a2a.dll

  • Size

    1.6MB

  • MD5

    c47487a80b0873549074634cdcf52937

  • SHA1

    056dafdfe9de1460cc396e097947db8286fc845a

  • SHA256

    97a997a2a3b270a4db3b56fec30319bc0f41f069a5089c47f08e4c554bf3ac32

  • SHA512

    1f447151348b1cc4d2ed4b896d45a91cbe34674987135bad69701f54c15a4526c7235e07238ea5cbe1f89483a39542dd36ab546c41e99eb9e789d84743828759

  • SSDEEP

    24576:yUbdgXkRLmlAbd3HVyenqbG1Wf1r/sx9NB2QIg7eCH+TQ0+:3bdgXkR8OFyenqbGoAjB2QIEneTr+

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\instructions_read_me.txt

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: b3755e21-718d-4a53-a71f-ce2cf26b0e02 *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\97a997a2a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\97a997a2a.dll,#1
      2⤵
      • Modifies extensions of user files
      • Drops file in Program Files directory
      • Modifies registry class
      PID:2140

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\instructions_read_me.txt

    Filesize

    1KB

    MD5

    0d52501b4dca47e2f0d4507a8814694c

    SHA1

    41fde8d323ead7f5507f4c15dfb11133387196ef

    SHA256

    729562c350ab7780794b13fc00506bea1928f294eadf78145264d1c5b3180368

    SHA512

    c694c1a35a1d001cd01eab0b0df10dd21e1bb4b96a9a42c87f157623bb296b5eaecafdbb5f6d90e6bde594d076793276f53ad9eb27606af68e2df5e4d71c427e

  • memory/2140-133-0x0000000010000000-0x00000000100D5000-memory.dmp

    Filesize

    852KB

  • memory/2140-135-0x0000000010000000-0x00000000100D5000-memory.dmp

    Filesize

    852KB

  • memory/2140-136-0x0000000010000000-0x00000000100D5000-memory.dmp

    Filesize

    852KB

  • memory/2140-142-0x0000000010000000-0x00000000100D5000-memory.dmp

    Filesize

    852KB

  • memory/2140-170-0x00000000032F0000-0x00000000033C5000-memory.dmp

    Filesize

    852KB

  • memory/2140-1512-0x0000000003CB0000-0x0000000003D85000-memory.dmp

    Filesize

    852KB

  • memory/2140-4694-0x0000000003E70000-0x0000000003F45000-memory.dmp

    Filesize

    852KB