Resubmissions

10-10-2023 08:37

231010-kh9p8acb8x 10

22-05-2023 12:23

230522-pkjc9sgd25 10

Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-10-2023 08:37

General

  • Target

    1dll.exe

  • Size

    92KB

  • MD5

    85e909a30b4ccbd76d9a1d0d689ce807

  • SHA1

    61cdf7aed6b2e5db0e88dd1cbb155bb1093ebd3b

  • SHA256

    f7ca01560b2b1fb8404a5cb1f6ec7251a38ca40c22fe4199bfeaaf1c25e520a1

  • SHA512

    a04f26a80c677d439f478d30e24b544501971c80a0cdd2f023268342daf8293776846c61230a275c0f9427319d848e5387861c7b93888bc0e505e2003cf06bbd

  • SSDEEP

    1536:mBwl+KXpsqN5vlwWYyhY9S4ACp81XCKq9e2T14VF992X4ZlFpEJ:Qw+asqN5aW/hL44A2HAIHEJ

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
All FILES ENCRYPTED "RSA1024" All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected] IN THE LETTER WRITE YOUR ID, YOUR ID F1CA5187 IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: [email protected] YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON'T PULL TIME, WAITING YOUR EMAIL FREE DECRYPTION FOR PROOF You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) DECRYPTION PROCESS: When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you: 1. Decryption program. 2. Detailed instruction for decryption. 3. And individual keys for decrypting your files. !WARNING! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (450) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dll.exe
    "C:\Users\Admin\AppData\Local\Temp\1dll.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\system32\mode.com
        mode con cp select=1251
        3⤵
          PID:1668
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:4580
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Windows\system32\mode.com
          mode con cp select=1251
          3⤵
            PID:5108
          • C:\Windows\system32\vssadmin.exe
            vssadmin delete shadows /all /quiet
            3⤵
            • Interacts with shadow copies
            PID:3052
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
          2⤵
            PID:3460
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
            2⤵
              PID:5420
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4956
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:5848
            • C:\Users\Admin\AppData\Local\Temp\1dll.exe
              "C:\Users\Admin\AppData\Local\Temp\1dll.exe"
              1⤵
                PID:3272
              • C:\Windows\system32\werfault.exe
                werfault.exe /h /shared Global\2f96b91875734fac9e0d89864effe5b2 /t 5652 /p 5420
                1⤵
                  PID:5928
                • C:\Windows\system32\werfault.exe
                  werfault.exe /h /shared Global\c0bc5068cf644db89ad391d8ba18e1e9 /t 7156 /p 3460
                  1⤵
                    PID:5516
                  • C:\Windows\system32\NOTEPAD.EXE
                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RETURN FILES.txt
                    1⤵
                    • Suspicious use of FindShellTrayWindow
                    PID:5832

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-F1CA5187.[[email protected]].jack

                    Filesize

                    2.9MB

                    MD5

                    8222c54a149718c16912ff6c7aadbd00

                    SHA1

                    14aba66c9abcba5445676ffea28530f7bc72c323

                    SHA256

                    e12f3761a367cd587faea6723d9d97db2f757b22977f33e5564eeaa81c097fa8

                    SHA512

                    db360ffe62d6c32edf2f99655085f19e939d31ff92d59c04811655958ececd4c84e039dcad6c27de66b8e8763e511dc067ed16ad843576adebad7809c11b903b

                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

                    Filesize

                    13KB

                    MD5

                    ab8ab402ea3ed7c657d648ed02c20c5b

                    SHA1

                    4fbe9451f97b860b78524346d76a0a89412bff47

                    SHA256

                    96bb3eb9fdc1370d4dd9b26e5cb5119679d456184d300881ac8614071e0956d5

                    SHA512

                    f53c87b8b47e3d439ce110f5b074bdcb93b35c60d1303f9be785e5d1406383964afae77049e864679ee213859bda5839fcad15a29415bdf5fd3f8d1433dd43db

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

                    Filesize

                    13KB

                    MD5

                    ab8ab402ea3ed7c657d648ed02c20c5b

                    SHA1

                    4fbe9451f97b860b78524346d76a0a89412bff47

                    SHA256

                    96bb3eb9fdc1370d4dd9b26e5cb5119679d456184d300881ac8614071e0956d5

                    SHA512

                    f53c87b8b47e3d439ce110f5b074bdcb93b35c60d1303f9be785e5d1406383964afae77049e864679ee213859bda5839fcad15a29415bdf5fd3f8d1433dd43db

                  • C:\Users\Admin\Desktop\RETURN FILES.txt

                    Filesize

                    142B

                    MD5

                    7e6028e7e55ae7b08987319a0689a2a3

                    SHA1

                    48a6e59cc6e2ea0d5dad6ca8621d2f0f8b501fd9

                    SHA256

                    d5d3da69d8dc722017261aed77e377e81efe51042046df723a0460cc8b73b2c0

                    SHA512

                    bcee11b2991e410d24a1511ef6ec0577c0101937d34291aecfa7221b66d294a250f76c60657aa3435676ba09e71343a22b3504bac733ef3242a2ec6b31f3f957