Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 12:11

General

  • Target

    VirusShare_060d41f75055ed0ffd43a408e6a5801e.exe

  • Size

    345KB

  • MD5

    060d41f75055ed0ffd43a408e6a5801e

  • SHA1

    96a466c5dbc7e4a10257afb3bd8b790f965084d9

  • SHA256

    34e1b92e38659dd6407c5065a3dd0cd8b791b182af5eaeb26b2a4573bc2177ea

  • SHA512

    663cd0f6d73fd7a91a6b7058c201bfe8f6797c94b90f1690119ad7b80f560e8f913143ed8e46c8efcf5d1450aa4eb5b69a0ad1ffc2646fe86f53fc96ecb014ff

  • SSDEEP

    6144:44oibXfchTduH5Gwqp5ASxhJq94C1ORG+v4igk72RC/kVp4uOebbkYCDG:NjbMQk5AOhJFGBmkVpvnkYz

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_gqslo.txt

Ransom Note
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What happened to your files ? All of your files were protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D 2. http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D 3. https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: kb63vhjuk3wh4ex7.onion/C68DEB6FF2815B2D 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D Your personal page (using TOR): kb63vhjuk3wh4ex7.onion/C68DEB6FF2815B2D Your personal identification number (if you open the site (or TOR 's) directly): C68DEB6FF2815B2D
URLs

http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D

http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D

https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D

http://kb63vhjuk3wh4ex7.onion/C68DEB6FF2815B2D

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_gqslo.html

Ransom Note
<html> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center> <div style="text-align:left; font-family:Arial; font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl">What happened <!------sfg2gdfstw5ey3345 --> to your files?</b></font><br> <font style="font-size:13px;">All of your files were<!------sfg2gdfstw5ey3345 --> protected by a strong<!------sfg2gdfstw5ey3345 --> encryption with<!------sfg2gdfstw5ey3345 --> RSA-2048 <br> More information about the <!------sfg2gdfstw5ey3345 -->encryption RSA-2048 can be<!------sfg2gdfstw5ey3345 --> found here: <a href="http://en.wikipedia.org/wiki/RSA_(cryptosystem)" target="_blank">http://en.wikipedia.org/wiki/RSA_(cryptosystem)</a><br></font> <br><b><font class="ttl">What <!------sfg2gdfstw5ey3345 --> does this mean?</b></font><br><font style="font-size:13px;"> This<!------sfg2gdfstw5ey3345 --> means that the <!------sfg2gdfstw5ey3345 --> structure and data within your files have been irrevocably <!------sfg2gdfstw5ey3345 -->changed, you will not be able to work<br> with them, read<!------sfg2gdfstw5ey3345 --> them or see them, it is the same thing <!------sfg2gdfstw5ey3345 -->as losing them forever, but with our help, you can restore them.</font><br><br><b><font class="ttl">How did this happen?</b></font> <br> <font style="font-size:13px;"> Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. <br>All your <!------sdkfg3265436456hdfskjghfdg --> files were encrypted with the public key, <!------sdkfghd456334565436fskjghfdg --> which has been <!------sdkfghd45363456fskjghfdg --> transferred to <!------sdkfghdfskjghfdg -->your computer via <!------sdkfghd4356345643564356fskjghfdg -->the Internet.<br> <!------sdkfghd34563456fskjghfdg --> Decrypting of <!------sdkf45363456ghdfskjghfdg -->YOUR FILES is <!------sdkfghdfs4563456kjghfdg -->only possible <!------sdkfgh45364356dfskjghfdg -->with the help of the <!------sdkfghd4563456fskjghfdg -->private key and <!------sdkfghd43563456fskjghfdg -->decrypt program, <!------sdkfghdf43564356tyretyskjghfdg -->which is on our <!------sdkfgh34565346dfskjghfdg -->SECRET SERVER!!!. </font><br><br><b><font class="ttl">What do I do?</b></font> <br><font style="font-size:13px;">Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed.<br> If you really need your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist.</font><br><br> <!------23452345dgtwertwre --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: <hr> <!------sadfs32452345gfdsgsdfgdfsafasdfasdfsadf --><b>1.<a href="http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D" target="_blank">http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D</a></b><br> <!------ds234523452345fgwert --><b>2.<a href="http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D" target="_blank">http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D</a></b><br> <!------wer234524353245terwtewrt --><b>3.<a href="https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D" target="_blank">https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D</a></b><br> <!------sfg2gdfstw5ey3345 --></div><br><div class="tb" style="font-size:13px; border-color:#880000;">If for some reasons the addresses are not available, follow these steps: <hr>1. Download and install tor-browser: <a href="http://www.torproject.org/projects/torbrowser.html.en" target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br>2. After a successful installation, run the browser and wait for initialization.<br>3. Type in the address bar: <font style="font-weight:bold; color:#009977;">kb63vhjuk3wh4ex7.onion/C68DEB6FF2815B2D</font><br>4. Follow the instructions on the site.</div><br><br><b>IMPORTANT INFORMATION:</b><br><div class="tb" style="width:790px;"> Your Personal PAGES: <b><br> <a href="http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D" target="_blank">http://kwe2342fsd.rt546sdf234re.com/C68DEB6FF2815B2D</a> <br> <a href="http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D" target="_blank">http://awoeinf832as.wo49i277rnw.com/C68DEB6FF2815B2D</a> <br> <a href="https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D" target="_blank"> https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D</a> </b> <br> Your Personal PAGE (using TOR): <font style="font-weight:bold; color:#009977;">kb63vhjuk3wh4ex7.onion/C68DEB6FF2815B2D</font><br> Your personal code (if you open the site (or TOR 's) directly): <font style="font-weight:bold; color:#770000;">C68DEB6FF2815B2D</font><br> </div></div></center></body></html>
URLs

https://kb63vhjuk3wh4ex7.onion.to/C68DEB6FF2815B2D</a>

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (350) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_060d41f75055ed0ffd43a408e6a5801e.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_060d41f75055ed0ffd43a408e6a5801e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Roaming\vcwpdy.exe
      C:\Users\Admin\AppData\Roaming\vcwpdy.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2108
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2668
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL
      2⤵
      • Deletes itself
      PID:2288
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_gqslo.html

    Filesize

    4KB

    MD5

    4c54ef41f34b8f7f18b3ad208d00b927

    SHA1

    299a0048481bf50a4462b25b8fbefcd73ef94b42

    SHA256

    363ba881d4fa1fccc05d91f12a23f52430aae0f1788a705217d684e858bbee6d

    SHA512

    748cf44ba798a3a2ec75dbf0f9b0acf943bdd2d3b761ec27c58b597a792c9156d8efa2a0838449574b6287afe4e453bee48fac2c28841925f16596d9a95b35be

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_gqslo.txt

    Filesize

    2KB

    MD5

    e26b60979f6f2c4f02dc76f7d5749db9

    SHA1

    fc70868b12d7d5aec9231b92e6cc89701c503322

    SHA256

    f784a4a6493755229620cfbcd3eab0f31f520dab37c84b304ec11461590d801c

    SHA512

    fea41514f253d5411701cb20aedf48114d6aa77f161f22a99aa2c79866c8a480bd5c09736d63a9e7dabab88172f417c9660223928e698338e7e0d3634b2bfcd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22b75f72198a902413942be3abf2325b

    SHA1

    71df514c1ec8039b275ef820abaf3154bbb19fe1

    SHA256

    6869e354f2f5a9a0b0b11d3b6601a760155315844de39f51666fce0217490aee

    SHA512

    4f82c2d55472dcd536681ded6d34f9efe231876d500191911cdb2d0932c273cad7a1db06ba40b473a9f303bc1e9b308338f587c89f0ffea64ff8415224fbab05

  • C:\Users\Admin\AppData\Local\Temp\CabF7C9.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF877.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Roaming\vcwpdy.exe

    Filesize

    345KB

    MD5

    060d41f75055ed0ffd43a408e6a5801e

    SHA1

    96a466c5dbc7e4a10257afb3bd8b790f965084d9

    SHA256

    34e1b92e38659dd6407c5065a3dd0cd8b791b182af5eaeb26b2a4573bc2177ea

    SHA512

    663cd0f6d73fd7a91a6b7058c201bfe8f6797c94b90f1690119ad7b80f560e8f913143ed8e46c8efcf5d1450aa4eb5b69a0ad1ffc2646fe86f53fc96ecb014ff

  • memory/1396-1-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/1396-0-0x00000000001C0000-0x00000000001C3000-memory.dmp

    Filesize

    12KB

  • memory/1396-5-0x00000000001D0000-0x00000000001D4000-memory.dmp

    Filesize

    16KB

  • memory/1396-15-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-714-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-1926-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-568-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-345-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-17-0x0000000000250000-0x0000000000254000-memory.dmp

    Filesize

    16KB

  • memory/2108-12-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-1521-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-674-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-1965-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-2071-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-2968-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-3375-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-3452-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-3523-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2108-3880-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB