Analysis
-
max time kernel
200s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2023 07:35
Behavioral task
behavioral1
Sample
0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe
Resource
win10v2004-20230220-en
General
-
Target
0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe
-
Size
1.8MB
-
MD5
662b823d2472f494c5d539d0694cca77
-
SHA1
f8fc84030c579070b36c99c836ac4b5c32bbc2c4
-
SHA256
0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00
-
SHA512
302d09017cd6bda0b78dbbae8d4353c03088e3244f8bbed242b8937125fa27086cfdf653ad3dbab9738ee0aee8010f378047916e19e2d323d64b993cc62e441d
-
SSDEEP
49152:azqqZpvT9ZwA/kzgdtK26LD4z3iXA2f9TWSDGDN1Z:sHZpvpZfkYK26LUz3i10SoN1Z
Malware Config
Extracted
C:\Users\Admin\Desktop\HOW-TO-DECRYPT-kgkq9.txt
Signatures
-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload 6 IoCs
resource yara_rule behavioral1/memory/3048-133-0x0000000140000000-0x00000001401D6000-memory.dmp family_hades behavioral1/memory/3048-140-0x0000000140000000-0x00000001401D6000-memory.dmp family_hades behavioral1/memory/396-144-0x0000000140000000-0x00000001401D6000-memory.dmp family_hades behavioral1/memory/396-301-0x0000000140000000-0x00000001401D6000-memory.dmp family_hades behavioral1/memory/396-481-0x0000000140000000-0x00000001401D6000-memory.dmp family_hades behavioral1/memory/3048-482-0x0000000140000000-0x00000001401D6000-memory.dmp family_hades -
resource yara_rule behavioral1/files/0x000300000001e717-138.dat cryptone behavioral1/files/0x000300000001e717-139.dat cryptone -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ClearMerge.crw.kgkq9 Multivariant File renamed C:\Users\Admin\Pictures\DenyRegister.png => C:\Users\Admin\Pictures\DenyRegister.png.kgkq9 Multivariant File opened for modification C:\Users\Admin\Pictures\DenyRegister.png.kgkq9 Multivariant File renamed C:\Users\Admin\Pictures\UnlockConvert.tiff => C:\Users\Admin\Pictures\UnlockConvert.tiff.kgkq9 Multivariant File opened for modification C:\Users\Admin\Pictures\UnlockConvert.tiff.kgkq9 Multivariant File renamed C:\Users\Admin\Pictures\UpdateRequest.crw => C:\Users\Admin\Pictures\UpdateRequest.crw.kgkq9 Multivariant File opened for modification C:\Users\Admin\Pictures\UpdateRequest.crw.kgkq9 Multivariant File renamed C:\Users\Admin\Pictures\ClearMerge.crw => C:\Users\Admin\Pictures\ClearMerge.crw.kgkq9 Multivariant -
Executes dropped EXE 1 IoCs
pid Process 396 Multivariant -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3048 wrote to memory of 396 3048 0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe 94 PID 3048 wrote to memory of 396 3048 0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe 94 PID 396 wrote to memory of 4440 396 Multivariant 96 PID 396 wrote to memory of 4440 396 Multivariant 96 PID 3048 wrote to memory of 3652 3048 0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe 98 PID 3048 wrote to memory of 3652 3048 0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe 98 PID 4440 wrote to memory of 4852 4440 cmd.exe 100 PID 4440 wrote to memory of 4852 4440 cmd.exe 100 PID 3652 wrote to memory of 3960 3652 cmd.exe 101 PID 3652 wrote to memory of 3960 3652 cmd.exe 101 PID 3652 wrote to memory of 4164 3652 cmd.exe 102 PID 3652 wrote to memory of 4164 3652 cmd.exe 102 PID 4440 wrote to memory of 4140 4440 cmd.exe 103 PID 4440 wrote to memory of 4140 4440 cmd.exe 103 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4164 attrib.exe 4140 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe"C:\Users\Admin\AppData\Local\Temp\0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\DvdnavigatorPhotos\MultivariantC:\Users\Admin\AppData\Roaming\DvdnavigatorPhotos\Multivariant /go2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\DvdnavigatorPhotos\Multivariant" & del "C:\Users\Admin\AppData\Roaming\DvdnavigatorPhotos\Multivariant" & rd "C:\Users\Admin\AppData\Roaming\DvdnavigatorPhotos\"3⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y4⤵PID:4852
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\DvdnavigatorPhotos\Multivariant"4⤵
- Views/modifies file attributes
PID:4140
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe" & del "C:\Users\Admin\AppData\Local\Temp\0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe" & rd "C:\Users\Admin\AppData\Local\Temp\"2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y3⤵PID:3960
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe"3⤵
- Views/modifies file attributes
PID:4164
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5662b823d2472f494c5d539d0694cca77
SHA1f8fc84030c579070b36c99c836ac4b5c32bbc2c4
SHA2560dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00
SHA512302d09017cd6bda0b78dbbae8d4353c03088e3244f8bbed242b8937125fa27086cfdf653ad3dbab9738ee0aee8010f378047916e19e2d323d64b993cc62e441d
-
Filesize
1.8MB
MD5662b823d2472f494c5d539d0694cca77
SHA1f8fc84030c579070b36c99c836ac4b5c32bbc2c4
SHA2560dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00
SHA512302d09017cd6bda0b78dbbae8d4353c03088e3244f8bbed242b8937125fa27086cfdf653ad3dbab9738ee0aee8010f378047916e19e2d323d64b993cc62e441d
-
Filesize
3KB
MD5c45ef114702049f0580a6a2d7e4bd160
SHA172eed2c2c3e7a7205bab42f5b53c5bab77d53514
SHA2568325c375297c26f908e6bec87e1a28bb188e2ba692fe09e5ca8d483c64ba0b5a
SHA512f007e89bf3a9b7033205f40bc2992feedc00fb82d0fa6742621c924da9b3d31edf1d27b9e46e3e845be14cd345bc7e14d6292f0465a00d3532d2134a29f03541