Analysis

  • max time kernel
    129s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2023 17:27

General

  • Target

    HEUR-Trojan.Win32.exe

  • Size

    76KB

  • MD5

    56895d0a3d6b6f9107448c4c94c8608e

  • SHA1

    cf0243d461f1b820df9861ea5930a02c211d8ef6

  • SHA256

    83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928

  • SHA512

    d8893fb5b7ddf854f85a3196d2d2b9ea6807ea9c1937b7a7fcfae2261ba9eaab2d18b66646e93ffec21d64caccdba9e2b1f3fc4e0be006c837c3df8493ec4b49

  • SSDEEP

    1536:dPpMF9fS4PUP511AtDxD93D+e+xKiSUrJTsD:za4P511INpCe2LrJTs

Score
10/10

Malware Config

Extracted

Path

C:\PerfLogs\HELP_DECRYPT_YOUR_FILES.TXT

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: https://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-2048 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start send email now for more specific instructions! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions: Contact us by email only, send us an email along with your ID number and wait for further instructions. Our specialist will contact you within 24 hours. For you to be sure, that we can decrypt your files - you can send us a single encrypted file and we will send you back it in a decrypted form. This will be your guarantee. Please do not waste your time! You have 72 hours only! After that The Main Server will double your price! So right now You have a chance to buy your individual private softWare with a low price! E-MAIL1: [email protected] E-MAIL2: [email protected] Spare email: E-MAIL1: [email protected] E-MAIL2: [email protected] YOUR_ID: db1583f91c9b74ea

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 27 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1652
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1344
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Z: /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin Delete Shadows /For=Z: /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1752
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Y: /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin Delete Shadows /For=Y: /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=X: /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin Delete Shadows /For=X: /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:956
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=W: /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin Delete Shadows /For=W: /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1700
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=V: /All /Quiet
      2⤵
        PID:1552
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin Delete Shadows /For=V: /All /Quiet
          3⤵
          • Interacts with shadow copies
          PID:1532
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=U: /All /Quiet
        2⤵
          PID:1996
          • C:\Windows\SysWOW64\vssadmin.exe
            vssadmin Delete Shadows /For=U: /All /Quiet
            3⤵
            • Interacts with shadow copies
            PID:868
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=T: /All /Quiet
          2⤵
            PID:840
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin Delete Shadows /For=T: /All /Quiet
              3⤵
              • Interacts with shadow copies
              PID:1336
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=S: /All /Quiet
            2⤵
              PID:1728
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin Delete Shadows /For=S: /All /Quiet
                3⤵
                • Interacts with shadow copies
                PID:1732
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=R: /All /Quiet
              2⤵
                PID:1740
                • C:\Windows\SysWOW64\vssadmin.exe
                  vssadmin Delete Shadows /For=R: /All /Quiet
                  3⤵
                  • Interacts with shadow copies
                  PID:1232
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Q: /All /Quiet
                2⤵
                  PID:1648
                  • C:\Windows\SysWOW64\vssadmin.exe
                    vssadmin Delete Shadows /For=Q: /All /Quiet
                    3⤵
                    • Interacts with shadow copies
                    PID:748
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=P: /All /Quiet
                  2⤵
                    PID:560
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin Delete Shadows /For=P: /All /Quiet
                      3⤵
                      • Interacts with shadow copies
                      PID:948
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=O: /All /Quiet
                    2⤵
                      PID:532
                      • C:\Windows\SysWOW64\vssadmin.exe
                        vssadmin Delete Shadows /For=O: /All /Quiet
                        3⤵
                        • Interacts with shadow copies
                        PID:2084
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=N: /All /Quiet
                      2⤵
                        PID:1212
                        • C:\Windows\SysWOW64\vssadmin.exe
                          vssadmin Delete Shadows /For=N: /All /Quiet
                          3⤵
                          • Interacts with shadow copies
                          PID:2268
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=M: /All /Quiet
                        2⤵
                          PID:1404
                          • C:\Windows\SysWOW64\vssadmin.exe
                            vssadmin Delete Shadows /For=M: /All /Quiet
                            3⤵
                            • Interacts with shadow copies
                            PID:2292
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=L: /All /Quiet
                          2⤵
                            PID:2092
                            • C:\Windows\SysWOW64\vssadmin.exe
                              vssadmin Delete Shadows /For=L: /All /Quiet
                              3⤵
                              • Interacts with shadow copies
                              PID:2276
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=K: /All /Quiet
                            2⤵
                              PID:2244
                              • C:\Windows\SysWOW64\vssadmin.exe
                                vssadmin Delete Shadows /For=K: /All /Quiet
                                3⤵
                                • Interacts with shadow copies
                                PID:2396
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=J: /All /Quiet
                              2⤵
                                PID:2328
                                • C:\Windows\SysWOW64\vssadmin.exe
                                  vssadmin Delete Shadows /For=J: /All /Quiet
                                  3⤵
                                  • Interacts with shadow copies
                                  PID:2452
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=I: /All /Quiet
                                2⤵
                                  PID:2352
                                  • C:\Windows\SysWOW64\vssadmin.exe
                                    vssadmin Delete Shadows /For=I: /All /Quiet
                                    3⤵
                                    • Interacts with shadow copies
                                    PID:2484
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=H: /All /Quiet
                                  2⤵
                                    PID:2384
                                    • C:\Windows\SysWOW64\vssadmin.exe
                                      vssadmin Delete Shadows /For=H: /All /Quiet
                                      3⤵
                                      • Interacts with shadow copies
                                      PID:2568
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=G: /All /Quiet
                                    2⤵
                                      PID:2424
                                      • C:\Windows\SysWOW64\vssadmin.exe
                                        vssadmin Delete Shadows /For=G: /All /Quiet
                                        3⤵
                                        • Interacts with shadow copies
                                        PID:2604
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=F: /All /Quiet
                                      2⤵
                                        PID:2460
                                        • C:\Windows\SysWOW64\vssadmin.exe
                                          vssadmin Delete Shadows /For=F: /All /Quiet
                                          3⤵
                                          • Interacts with shadow copies
                                          PID:2576
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=E: /All /Quiet
                                        2⤵
                                          PID:2492
                                          • C:\Windows\SysWOW64\vssadmin.exe
                                            vssadmin Delete Shadows /For=E: /All /Quiet
                                            3⤵
                                            • Interacts with shadow copies
                                            PID:2616
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=D: /All /Quiet
                                          2⤵
                                            PID:2524
                                            • C:\Windows\SysWOW64\vssadmin.exe
                                              vssadmin Delete Shadows /For=D: /All /Quiet
                                              3⤵
                                              • Interacts with shadow copies
                                              PID:2672
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=C: /All /Quiet
                                            2⤵
                                              PID:2588
                                              • C:\Windows\SysWOW64\vssadmin.exe
                                                vssadmin Delete Shadows /For=C: /All /Quiet
                                                3⤵
                                                • Interacts with shadow copies
                                                PID:2788
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=B: /All /Quiet
                                              2⤵
                                                PID:2648
                                                • C:\Windows\SysWOW64\vssadmin.exe
                                                  vssadmin Delete Shadows /For=B: /All /Quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:2944
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=A: /All /Quiet
                                                2⤵
                                                  PID:2728
                                                  • C:\Windows\SysWOW64\vssadmin.exe
                                                    vssadmin Delete Shadows /For=A: /All /Quiet
                                                    3⤵
                                                    • Interacts with shadow copies
                                                    PID:2908
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled No
                                                  2⤵
                                                    PID:2796
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C net stop vss
                                                    2⤵
                                                      PID:2764
                                                      • C:\Windows\SysWOW64\net.exe
                                                        net stop vss
                                                        3⤵
                                                          PID:2992
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            C:\Windows\system32\net1 stop vss
                                                            4⤵
                                                              PID:3040
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                          2⤵
                                                            PID:2880
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" bcdedit /set {default} recoveryenabled No
                                                            2⤵
                                                              PID:2956
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                              2⤵
                                                                PID:2984
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" bcdedit /set bootstatuspolicy ignoreallfailures
                                                                2⤵
                                                                  PID:3028
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C bcdedit /set bootstatuspolicy ignoreallfailures
                                                                  2⤵
                                                                    PID:3060
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" bcdedit /set recoveryenabled NO
                                                                    2⤵
                                                                      PID:2340
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C bcdedit /set recoveryenabled NO
                                                                      2⤵
                                                                        PID:3036
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                                                                        2⤵
                                                                          PID:2504
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" wbadmin delete catalog -quiet
                                                                          2⤵
                                                                            PID:3060
                                                                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\HELP_DECRYPT_YOUR_FILES.TXT
                                                                            2⤵
                                                                            • Opens file in notepad (likely ransom note)
                                                                            PID:2580
                                                                        • C:\Windows\system32\vssvc.exe
                                                                          C:\Windows\system32\vssvc.exe
                                                                          1⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2192
                                                                        • C:\Windows\system32\conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe "-123240953182850162812487041801571282077-8286666711485676090-17992087321973256177"
                                                                          1⤵
                                                                            PID:2880

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v6

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\PerfLogs\HELP_DECRYPT_YOUR_FILES.TXT

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            58509e80a003bc6c10bd4111ceb2c241

                                                                            SHA1

                                                                            9b371c35fc653d82712f86261dcbf01849fcbf97

                                                                            SHA256

                                                                            0b6963c1e32ce8d484a1fbbef7b12be876a0f97ee4965a28208c31840449ba32

                                                                            SHA512

                                                                            0ff2280541abcdf383f9ae53b1679213d8a06b9b72580c9fd2abe59a8baea99d955fc546adb0264c4c5e1ae9f4c444f2a1972acdac08e58f3ac8abe01c6652ad

                                                                          • C:\PerfLogs\HELP_DECRYPT_YOUR_FILES.TXT

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            58509e80a003bc6c10bd4111ceb2c241

                                                                            SHA1

                                                                            9b371c35fc653d82712f86261dcbf01849fcbf97

                                                                            SHA256

                                                                            0b6963c1e32ce8d484a1fbbef7b12be876a0f97ee4965a28208c31840449ba32

                                                                            SHA512

                                                                            0ff2280541abcdf383f9ae53b1679213d8a06b9b72580c9fd2abe59a8baea99d955fc546adb0264c4c5e1ae9f4c444f2a1972acdac08e58f3ac8abe01c6652ad

                                                                          • C:\Users\Admin\Documents\HELP_DECRYPT_YOUR_FILES.TXT

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            58509e80a003bc6c10bd4111ceb2c241

                                                                            SHA1

                                                                            9b371c35fc653d82712f86261dcbf01849fcbf97

                                                                            SHA256

                                                                            0b6963c1e32ce8d484a1fbbef7b12be876a0f97ee4965a28208c31840449ba32

                                                                            SHA512

                                                                            0ff2280541abcdf383f9ae53b1679213d8a06b9b72580c9fd2abe59a8baea99d955fc546adb0264c4c5e1ae9f4c444f2a1972acdac08e58f3ac8abe01c6652ad

                                                                          • memory/1704-54-0x0000000000130000-0x000000000013B000-memory.dmp

                                                                            Filesize

                                                                            44KB