Analysis

  • max time kernel
    174s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 17:27

General

  • Target

    HEUR-Trojan.Win32.exe

  • Size

    76KB

  • MD5

    56895d0a3d6b6f9107448c4c94c8608e

  • SHA1

    cf0243d461f1b820df9861ea5930a02c211d8ef6

  • SHA256

    83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928

  • SHA512

    d8893fb5b7ddf854f85a3196d2d2b9ea6807ea9c1937b7a7fcfae2261ba9eaab2d18b66646e93ffec21d64caccdba9e2b1f3fc4e0be006c837c3df8493ec4b49

  • SSDEEP

    1536:dPpMF9fS4PUP511AtDxD93D+e+xKiSUrJTsD:za4P511INpCe2LrJTs

Score
10/10

Malware Config

Extracted

Path

C:\Program Files\HELP_DECRYPT_YOUR_FILES.TXT

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: https://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-2048 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start send email now for more specific instructions! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions: Contact us by email only, send us an email along with your ID number and wait for further instructions. Our specialist will contact you within 24 hours. For you to be sure, that we can decrypt your files - you can send us a single encrypted file and we will send you back it in a decrypted form. This will be your guarantee. Please do not waste your time! You have 72 hours only! After that The Main Server will double your price! So right now You have a chance to buy your individual private softWare with a low price! E-MAIL1: [email protected] E-MAIL2: [email protected] Spare email: E-MAIL1: [email protected] E-MAIL2: [email protected] YOUR_ID: ecce5e701c9b74ea

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.exe"
    1⤵
    • Modifies extensions of user files
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All /Quiet
      2⤵
        PID:2764
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5024
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Z: /All /Quiet
        2⤵
          PID:4968
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Y: /All /Quiet
          2⤵
            PID:4408
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=X: /All /Quiet
            2⤵
              PID:4220
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=W: /All /Quiet
              2⤵
                PID:220
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=V: /All /Quiet
                2⤵
                  PID:4548
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=U: /All /Quiet
                  2⤵
                    PID:1364
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=T: /All /Quiet
                    2⤵
                      PID:1548
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=S: /All /Quiet
                      2⤵
                        PID:3708
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=R: /All /Quiet
                        2⤵
                          PID:4944
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Q: /All /Quiet
                          2⤵
                            PID:4580
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=P: /All /Quiet
                            2⤵
                              PID:1116
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=O: /All /Quiet
                              2⤵
                                PID:2144
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=N: /All /Quiet
                                2⤵
                                  PID:4956
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=M: /All /Quiet
                                  2⤵
                                    PID:3820
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=L: /All /Quiet
                                    2⤵
                                      PID:4080
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=K: /All /Quiet
                                      2⤵
                                        PID:2732
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=J: /All /Quiet
                                        2⤵
                                          PID:4160
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=I: /All /Quiet
                                          2⤵
                                            PID:4108
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=H: /All /Quiet
                                            2⤵
                                              PID:8
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=G: /All /Quiet
                                              2⤵
                                                PID:2656
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=F: /All /Quiet
                                                2⤵
                                                  PID:2936
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=E: /All /Quiet
                                                  2⤵
                                                    PID:2236
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=D: /All /Quiet
                                                    2⤵
                                                      PID:4444
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=C: /All /Quiet
                                                      2⤵
                                                        PID:3296
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=B: /All /Quiet
                                                        2⤵
                                                          PID:4668
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=A: /All /Quiet
                                                          2⤵
                                                            PID:4196
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C net stop vss
                                                            2⤵
                                                              PID:2060
                                                              • C:\Windows\SysWOW64\net.exe
                                                                net stop vss
                                                                3⤵
                                                                  PID:4564
                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                    C:\Windows\system32\net1 stop vss
                                                                    4⤵
                                                                      PID:3464
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled No
                                                                  2⤵
                                                                    PID:2460
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                                    2⤵
                                                                      PID:4236
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" bcdedit /set {default} recoveryenabled No
                                                                      2⤵
                                                                        PID:2636
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                                        2⤵
                                                                          PID:4908
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" bcdedit /set bootstatuspolicy ignoreallfailures
                                                                          2⤵
                                                                            PID:3128
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C bcdedit /set bootstatuspolicy ignoreallfailures
                                                                            2⤵
                                                                              PID:4560
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" bcdedit /set recoveryenabled NO
                                                                              2⤵
                                                                                PID:4292
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C bcdedit /set recoveryenabled NO
                                                                                2⤵
                                                                                  PID:4408
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                                                                                  2⤵
                                                                                    PID:348
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" wbadmin delete catalog -quiet
                                                                                    2⤵
                                                                                      PID:4568
                                                                                    • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\HELP_DECRYPT_YOUR_FILES.TXT
                                                                                      2⤵
                                                                                      • Opens file in notepad (likely ransom note)
                                                                                      PID:488
                                                                                  • C:\Windows\system32\vssvc.exe
                                                                                    C:\Windows\system32\vssvc.exe
                                                                                    1⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4816

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v6

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Program Files\HELP_DECRYPT_YOUR_FILES.TXT

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    dabc16d87f1bfaf88844ba9c2c248cc0

                                                                                    SHA1

                                                                                    5aef54e298718743cae6317e9ca9a7e21f10e521

                                                                                    SHA256

                                                                                    fbdd072984a6b66dacd2301db01b46503818e262c8cf599706740b39fad46e14

                                                                                    SHA512

                                                                                    d1ce00dfe6ba68400b9fb8dfe86143404358317ec2496c527d811514a854da32d64dfddb14a37bcc72b198fb026d676c2333bee4fd1cc35c255cfb9f5b555b8e

                                                                                  • C:\Users\Admin\Documents\HELP_DECRYPT_YOUR_FILES.TXT

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    dabc16d87f1bfaf88844ba9c2c248cc0

                                                                                    SHA1

                                                                                    5aef54e298718743cae6317e9ca9a7e21f10e521

                                                                                    SHA256

                                                                                    fbdd072984a6b66dacd2301db01b46503818e262c8cf599706740b39fad46e14

                                                                                    SHA512

                                                                                    d1ce00dfe6ba68400b9fb8dfe86143404358317ec2496c527d811514a854da32d64dfddb14a37bcc72b198fb026d676c2333bee4fd1cc35c255cfb9f5b555b8e

                                                                                  • C:\odt\HELP_DECRYPT_YOUR_FILES.TXT

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    dabc16d87f1bfaf88844ba9c2c248cc0

                                                                                    SHA1

                                                                                    5aef54e298718743cae6317e9ca9a7e21f10e521

                                                                                    SHA256

                                                                                    fbdd072984a6b66dacd2301db01b46503818e262c8cf599706740b39fad46e14

                                                                                    SHA512

                                                                                    d1ce00dfe6ba68400b9fb8dfe86143404358317ec2496c527d811514a854da32d64dfddb14a37bcc72b198fb026d676c2333bee4fd1cc35c255cfb9f5b555b8e

                                                                                  • memory/4672-133-0x0000000000750000-0x000000000075B000-memory.dmp

                                                                                    Filesize

                                                                                    44KB