Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 15:27

General

  • Target

    403be0442e847aee7ca7553e19672112450f2e034180a1f57eb8a6d7d39b8d17.exe

  • Size

    31KB

  • MD5

    408358751abe67dcf31de9a955253724

  • SHA1

    81c19445c96f0b4346ae6b4036ff18c8c44db0ed

  • SHA256

    403be0442e847aee7ca7553e19672112450f2e034180a1f57eb8a6d7d39b8d17

  • SHA512

    ffc1425bfca8e5e1b78a43bac829b8930ade14b017c12e0218c44e594f2d559ca9f2060b204eb07115f2bbd4111199ea061852f1742763cfdc80a9808e9bc8aa

  • SSDEEP

    384:bMBQl5CVzAW054SrIVuLRR0b3ZpUyXhVgeHy3jfSG+wKmOL1MCEdYdOiHNFx2khV:bMBQWVM6Srtlab7MC6wThw4

Malware Config

Extracted

Path

C:\Program Files (x86)\Adobe\Reader 9.0\Esl\decrypt_Last_Chance.html

Ransom Note
<!DOCTYPE html> <html> <title>TargetWare Decryption Information</title> <meta name="viewport" content="width=device-width, initial-scale=1"> <head> <link rel="stylesheet" href="https://fonts.googleapis.com/icon?family=Material+Icons"> </head> <link rel="stylesheet" href="https://www.w3schools.com/w3css/4/w3.css"> <STYLE type="text/css"> BODY { background-color: rgb(246, 246, 246); } </STYLE> <body> <div class="w3-container w3-center " > <img src="https://www.seekpng.com/png/detail/227-2279324_oops-oops-png.png"> <div class="w3-container w3-border w3-small w3-content"> <div class="w3-panel w3-border-top w3-border-bottom w3-border-black w3-pale-gray " > <b>Dear Curexa, it`s only a warning to you. <br><br> Also we can wipe your systems but give you chance <br><br> Contact us within 48 hours for get more details ;) We also steal your databases with Prescriptions and Patient info.<br><br> <br><br> What happened to your files?<br><br> We completed target attack on your company.<br> All your files were encrypted by a <br> strong encryption with RSA2048 .<br> Our software not decryptable for free !<br> Try search in Google : MMM Ransomware, Triple M ransomware</b> ;)<br> </div> </div> <div class="w3-container w3-border w3-small w3-content"> <div class="w3-panel w3-border-top w3-border-bottom w3-border-black w3-pale-gray w3-content"> <b>Recomendations</b><br> Do not attempt to recover the files yourself.You might corrupt your files.<br> We rewrite all old blocks on your HDD and you can`t recover files with <br> Recuva ,Acronis etc...<br> <br> . </div> </div> <div class="w3-container w3-border w3-small w3-content"> <div class="w3-panel w3-border-top w3-border-bottom w3-border-black w3-pale-gray w3-content"> <b>How decrypt files?</b><br><br> Your uniq ID it`s <b>CRX202304</b>.<br> You have only 48 hours for contact with us.<br> Write within this time to email [email protected] or if you don`t get answer within 12 hours to Jabber (use Psi+ or Pidgin clients)<b> [email protected] </b><br> In first message write your uniq ID <b>CRX202304</b><br><br> </div> </div> </div> </body> </html>

Signatures

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\403be0442e847aee7ca7553e19672112450f2e034180a1f57eb8a6d7d39b8d17.exe
    "C:\Users\Admin\AppData\Local\Temp\403be0442e847aee7ca7553e19672112450f2e034180a1f57eb8a6d7d39b8d17.exe"
    1⤵
    • Drops startup file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Reader 9.0\Esl\decrypt_Last_Chance.html

    Filesize

    2KB

    MD5

    b20e472b04a6314c755aef583d7e5b84

    SHA1

    697f540da9cc422e6d26e4fe831511f258613060

    SHA256

    640ea8f8f8538fddfbb338ec2db57f5c32a99d67c1057e15bbb7ccc16e932711

    SHA512

    4d2bd2d01847cad32cfc502b97976fea3628647aa3217cbd9efcacf0ed43e9a19c75b1fdb72e1b46f20f2f79316ccd7b216b4cb64325748ff0a7067abdd19d2b

  • memory/3036-0-0x0000000000030000-0x000000000003E000-memory.dmp

    Filesize

    56KB

  • memory/3036-1-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

    Filesize

    9.9MB

  • memory/3036-2-0x000000001ACB0000-0x000000001AD30000-memory.dmp

    Filesize

    512KB

  • memory/3036-6233-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

    Filesize

    9.9MB

  • memory/3036-7888-0x000000001ACB0000-0x000000001AD30000-memory.dmp

    Filesize

    512KB