Analysis

  • max time kernel
    150s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 10:24

General

  • Target

    1c711ca465.dll

  • Size

    1.9MB

  • MD5

    77e3dec014ebb323d0ea3a3a55845c03

  • SHA1

    65c0b00878211d9651624dba2a26289cb7af0888

  • SHA256

    1c711ca465dace4d2a8d0542e75410c417375c4ee484294fcd959e99651fccb8

  • SHA512

    c88b58c8c51a3b18f6db00d941f0de8563c41c3a4223355070544b44f5d2b2bf25537fc8c89abd9873b8980a2be833462cf963e03938eb83aed42ea1e858c109

  • SSDEEP

    49152:GDnp+vZaxa1ara1agzT78n+QuUPXA8ZGy3MuxqDQwQ0UbgOW4fjd0J4HInL4UKNb:GDnC0XA161Ke

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\instructions_read_me.txt

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: b3755e21-718d-4a53-a71f-ce2cf26b0e02 *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

  • Drops file in Program Files directory 55 IoCs
  • Modifies registry class 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1c711ca465.dll,#1
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\instructions_read_me.txt
    Filesize

    1KB

    MD5

    0d52501b4dca47e2f0d4507a8814694c

    SHA1

    41fde8d323ead7f5507f4c15dfb11133387196ef

    SHA256

    729562c350ab7780794b13fc00506bea1928f294eadf78145264d1c5b3180368

    SHA512

    c694c1a35a1d001cd01eab0b0df10dd21e1bb4b96a9a42c87f157623bb296b5eaecafdbb5f6d90e6bde594d076793276f53ad9eb27606af68e2df5e4d71c427e

  • memory/112-54-0x0000000180000000-0x0000000180108000-memory.dmp
    Filesize

    1.0MB

  • memory/112-56-0x0000000180000000-0x0000000180108000-memory.dmp
    Filesize

    1.0MB

  • memory/112-64-0x0000000180000000-0x0000000180108000-memory.dmp
    Filesize

    1.0MB

  • memory/112-114-0x0000000002D80000-0x0000000002E88000-memory.dmp
    Filesize

    1.0MB