Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 08:34

General

  • Target

    3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe

  • Size

    453KB

  • MD5

    248c960c1ae54103dea5bfae924f28e2

  • SHA1

    504ce8efee0f7f8329c09c6d045a21c795a84b42

  • SHA256

    3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363

  • SHA512

    5b3dd4be33c48cedda5b9270a6454540e837e9611db4d43b35e7290ff7e25dd3b5c0342de6de38f12e8c7d5f291c62ef026236825134d1181e7ba5bdf8103464

  • SSDEEP

    6144:/P2vVfY9RbTrI5Tm6oUAcEtKY/e8lmceEoAE77OvaHhdRwc9/P2wdAn7gJRKKRqX:aVw9prIVpb3F8ltQlBwc9/P2l7gT6

Malware Config

Extracted

Path

F:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
    "C:\Users\Admin\AppData\Local\Temp\3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe"
    1⤵
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\system32\wbem\wmic.exe
      "C:\ohaoa\owxd\..\..\Windows\rysv\..\system32\tv\e\acvj\..\..\..\wbem\icyn\blhb\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2112
    • C:\Windows\system32\wbem\wmic.exe
      "C:\cqof\kj\v\..\..\..\Windows\grhio\..\system32\womtn\..\wbem\d\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2800
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:2252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_E39D98A4B875429E9C6C069EED7A4FFC.dat

      Filesize

      940B

      MD5

      b317c06b1e6524f691c98dcfa0fae191

      SHA1

      94c9164622dbb468ae557c05c2b3cd9a47f6602a

      SHA256

      4ea80c710286c10d54e940a764d57c20dff7afb3d32113a59a89015a41ca8035

      SHA512

      2f10faeb189695681ac5cc8dbb63af5c4c5684719d2905a3e861746d4c540bc657a86e02dd166eb9a8477155cdeea8cf0541f24cb0ece128fe28321ad358fbdc

    • F:\DECRYPT-FILES.html

      Filesize

      6KB

      MD5

      875fd5e58398f0e10b0460cbebe6c408

      SHA1

      27f3392346284c6782bc901fb670caf7f76a577a

      SHA256

      e27b2705f01d21040d94828cb9e187cbbba12141c755f96d3572941bc14cf28b

      SHA512

      88cd030d349dc36e52a2a64627ac5eaf2d83ca9e6990b976b14d9d7f8e6af4fbd2afc30500450401921603b51683bf0954ccd2b1b03b07661f74c88f6ea3a438

    • memory/1664-0-0x0000000000330000-0x0000000000389000-memory.dmp

      Filesize

      356KB

    • memory/1664-5-0x0000000000330000-0x0000000000389000-memory.dmp

      Filesize

      356KB

    • memory/1664-7-0x0000000000330000-0x0000000000389000-memory.dmp

      Filesize

      356KB

    • memory/1664-10-0x0000000000330000-0x0000000000389000-memory.dmp

      Filesize

      356KB

    • memory/1664-1917-0x0000000000330000-0x0000000000389000-memory.dmp

      Filesize

      356KB