Analysis

  • max time kernel
    148s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-06-2023 06:52

General

  • Target

    03769899.exe

  • Size

    261KB

  • MD5

    7d80230df68ccba871815d68f016c282

  • SHA1

    e10874c6108a26ceedfc84f50881824462b5b6b6

  • SHA256

    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

  • SHA512

    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

  • SSDEEP

    3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>jTYxD4A4XaGW/GynzthK3KPSZbmKvkyX5Wc4yg1SXXcsPDsSYkIcgVMWiaHkeVkJKIi73AngiQTY/I3pnylJEejEEbPmAojJ9uehMomNjqyXwGVnwqy2eDgUCnxd3vuh3ph8I/LnioZ7dzu+V9S7uuZDhNwwhholUm9r/IV4Ew9R/H/EmJisKJn46CYtx3fm5/5I1NzRZBv8dcYLRff8pORn8Sz3qwJ+ACMPCTbrQRFxBk/L0tlKPxpViBpVHNzQR8WlR+2o8cXA0291oFKhEQHG3p2amLJjmHAsskU8pyfyw8R2XTRQLb5jGjRdj1I0HSqGjossbMhmuJOhfYBTxg==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Renames multiple (1335) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03769899.exe
    "C:\Users\Admin\AppData\Local\Temp\03769899.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML

    Filesize

    1KB

    MD5

    3dacd8d150d241a6c3208bc46ecb7311

    SHA1

    7b284f83291c897ad135963f047df5b484c0bad5

    SHA256

    083cbbf466df5cf10552f34ab8b64736569de9b9c24d42537c719a40ae492bd5

    SHA512

    1ab848609921629f9406124f9f4a7926c4b1895db2e1985bf1ea82baf4df3d8069f299c7b9728fd0350558db3532d5156820663e94659537169a52b790e0ccf2

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    b6b3cb1d88ebec01742a3ffe885cc258

    SHA1

    b323d583e73975c0b0f2b2b7e28dd68e5e45642e

    SHA256

    1e967bda1f4ee94a73606f85f500720dc926c67c6ef44c0b90e7274813cc067a

    SHA512

    d9309e8d312417e3a878e1420880170729cdbf893fd81f36fa6bbc26ab2bc136031c699061e6248c7962d2a024d9a9cf5888b39c550f2849fe90bb7db4b190b4

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    c601b6337ce742995d0dfe547403b508

    SHA1

    f3d14b2314c10bed9a94ef67fd360133f43e7c50

    SHA256

    ab200a78c6cdb6be004946c4cbfeaa1dd277e0f258cd3556b916624428e977f0

    SHA512

    78e69bb58004e8d5d90429d967ec693a49ae6cca1555e3426f86db7eda441c22e1a54d73bbe3c6d44ee108f7a254e35fd117661b2548ff89c7d1d53646d36dd5

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    8af2bfeea957eaeda01e56c4b798c7e5

    SHA1

    ada02e5eed48ee8a3020824d025049817b4baccb

    SHA256

    00964125a9e8b6669b451e5c5d8f8ea80ea205d3f0fa6a638f3b16f84a74217e

    SHA512

    07d94cb7ebcdf811f0ead69470dd121c2af1585cafb83c2005acb888caa22e336416b712b73dfe1bb249983a0ab5b73c261b2173806ccfd490030bfe1444d3de

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    d8eabcaae6acb6530e5aaf092c8275b1

    SHA1

    3d7e1981b337d2525c8370cf50bebd79fe814e68

    SHA256

    18e4661e91d9213c45ca952eb61c52fd3a2d6dcfe46feb78014eea3616425e03

    SHA512

    0a909d37b314525a1f7abe5dc58293ab7d7c56d82144b4b10cc38085058f7e5b2cba5a5e507ce93809b8c858819e791845325a872ced3a1b1a0a2b417c6e977f

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    60d4097acb126619ed9664a1721e3a86

    SHA1

    6fa64abe764439f929b97b6d18b3dbc6b293e229

    SHA256

    65a7112db66aebb8c543f9ee33c1d6a57c099ef41fc0da9e30b5f7337c272e3d

    SHA512

    e12b1966e38e908809a848c1077a0117bd24352119ba229b114e3b62d5cac315b7c3741f9e67f58f5981867fb564eaa9c70d6df5bc39b1f7281340ae595459d9

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    7dd44929034f8c8c2cde9f129fd13191

    SHA1

    70a57b74bea5039a826cdf0a9525b7a7206c2aa1

    SHA256

    41c332a4c056c138d3cf552f4876dab0b17d12270741538a09295aae642e843b

    SHA512

    67baf568f1e60bf69652b8b3c445616739debe9f9939782d87f07c77fff0e97056cfce511f8368b084d5f01c45e594cfdf37d4fc6ac677dcc4bbf130a467eaeb

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • \Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • memory/996-649-0x000000001AFC0000-0x000000001B040000-memory.dmp

    Filesize

    512KB

  • memory/996-194-0x000000001AFC0000-0x000000001B040000-memory.dmp

    Filesize

    512KB

  • memory/996-191-0x0000000000850000-0x000000000085C000-memory.dmp

    Filesize

    48KB

  • memory/996-193-0x000000001AFC0000-0x000000001B040000-memory.dmp

    Filesize

    512KB

  • memory/996-650-0x000000001AFC0000-0x000000001B040000-memory.dmp

    Filesize

    512KB

  • memory/1700-91-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-61-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-101-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-105-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-109-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-115-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-117-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-121-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-119-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-113-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-111-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-108-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/1700-107-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/1700-103-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-97-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-93-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-85-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-81-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-75-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-69-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-65-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-99-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-182-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

    Filesize

    4KB

  • memory/1700-183-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/1700-184-0x00000000020B0000-0x00000000020BE000-memory.dmp

    Filesize

    56KB

  • memory/1700-95-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-54-0x0000000001F90000-0x0000000001FC2000-memory.dmp

    Filesize

    200KB

  • memory/1700-89-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-87-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-192-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/1700-83-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-79-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-77-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-648-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/1700-73-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-71-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-67-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-63-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-59-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-57-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-56-0x0000000001FF0000-0x000000000201B000-memory.dmp

    Filesize

    172KB

  • memory/1700-55-0x0000000001FF0000-0x0000000002022000-memory.dmp

    Filesize

    200KB