Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2023, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Bart.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Bart.exe
Resource
win10v2004-20230220-en
General
-
Target
Trojan-Ransom.Win32.Bart.exe
-
Size
121KB
-
MD5
6de7324c37519831cf586e3b2c786e53
-
SHA1
abb423454abd2caa431634667903640037b6ee9b
-
SHA256
45fcdd90b1268f6d5dd2a99a78c3df1a95b7809cbe13b68d9f164edd2264005e
-
SHA512
6172a9b52749e89017c4ad2f685a4399e5d092e0517ef98dff6d071b61e5db7343ca5298d00c57b1fed2d5a7afc9b63d2be8cd89b83af0c09b3e6c950c227227
-
SSDEEP
3072:3s+7qZCqeKW9cafSypBCaJDftXdCD66X:377qZCqeKW9cotpBfVVoDX
Malware Config
Extracted
C:\ProgramData\Microsoft\User Account Pictures\recover.txt
http://s3clm4lufbmfhmeb.tor2web.org/?id=Av4FlE4c0fbQZGneSyP4oT8G1PJiCB8SDgCfAvD5uZs81g%3d%3d
http://s3clm4lufbmfhmeb.onion.to/?id=Av4FlE4c0fbQZGneSyP4oT8G1PJiCB8SDgCfAvD5uZs81g%3d%3d
http://s3clm4lufbmfhmeb.onion.cab/?id=Av4FlE4c0fbQZGneSyP4oT8G1PJiCB8SDgCfAvD5uZs81g%3d%3d
http://s3clm4lufbmfhmeb.onion.link/?id=Av4FlE4c0fbQZGneSyP4oT8G1PJiCB8SDgCfAvD5uZs81g%3d%3d
http://s3clm4lufbmfhmeb.onion/?id=Av4FlE4c0fbQZGneSyP4oT8G1PJiCB8SDgCfAvD5uZs81g%3d%3d
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" Trojan-Ransom.Win32.Bart.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\GroupBlock.tif.bart Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\ProtectPublish.tiff Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\ProtectPublish.tiff.bart Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\BackupRestore.tif.bart Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\ConnectShow.tiff Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\ConnectShow.tiff.bart Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\FindMount.tiff Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\FindMount.tiff.bart Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\OutRegister.tif.bart Trojan-Ransom.Win32.Bart.exe File opened for modification C:\Users\Admin\Pictures\PublishExit.png.bart Trojan-Ransom.Win32.Bart.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Bart.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\recover.bmp" Trojan-Ransom.Win32.Bart.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1988 notepad.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2044 Trojan-Ransom.Win32.Bart.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1988 2044 Trojan-Ransom.Win32.Bart.exe 34 PID 2044 wrote to memory of 1988 2044 Trojan-Ransom.Win32.Bart.exe 34 PID 2044 wrote to memory of 1988 2044 Trojan-Ransom.Win32.Bart.exe 34 PID 2044 wrote to memory of 1988 2044 Trojan-Ransom.Win32.Bart.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Bart.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Bart.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies extensions of user files
- Checks computer location settings
- Sets desktop wallpaper using registry
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\notepad.exenotepad.exe "C:\Users\Admin\Desktop\recover.txt"o2⤵
- Opens file in notepad (likely ransom note)
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57753c51c4bddef0507774acb1fbde693
SHA18735a767b5b252ca3a4a25b9eb25a5e45079dcc3
SHA25649f6a4ea6fae5cad1360a5a6c8d28cf6839ed1b8f21ae576861cdbe2932ee39e
SHA5125b59f80011399e2a0ccbe63f7068a213b4e166f4b5e7cdcd6db25f36f1ca1398bb42a00a79fb9a01fb217fa2158d966ae74fd4d6bed84ac37004ed429f3da8cf
-
Filesize
4KB
MD5c128d18f7a75132b6d8b704333d1a6c3
SHA17f14d32bbcf4ba73bb5ee75ec7088f090b4abb24
SHA2564f5ac63698a42be9bbea5c0fa65b376620bf9cc13bbabfb9de68ec743503e4c4
SHA5120a0b868d446eb324db5defdfcf6f37c9ce3a849a39e0f6c5436665359934564ea17a622197a4ba45cb32cdc3689db1668f54f0c32bf1b3e0a6cbd68ea59a342f
-
Filesize
2KB
MD57753c51c4bddef0507774acb1fbde693
SHA18735a767b5b252ca3a4a25b9eb25a5e45079dcc3
SHA25649f6a4ea6fae5cad1360a5a6c8d28cf6839ed1b8f21ae576861cdbe2932ee39e
SHA5125b59f80011399e2a0ccbe63f7068a213b4e166f4b5e7cdcd6db25f36f1ca1398bb42a00a79fb9a01fb217fa2158d966ae74fd4d6bed84ac37004ed429f3da8cf