Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 10:18

General

  • Target

    deebdc98c7394419d6493a4226b56c7d.exe

  • Size

    3.9MB

  • MD5

    deebdc98c7394419d6493a4226b56c7d

  • SHA1

    ff261c48c2da2cdfc88f79e53ca08127846ba87f

  • SHA256

    6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e

  • SHA512

    4f12f352c0c2e9831f29211cd5bbcad5f83401d6760344b6e4585d0ff6fc4043874c2bb5d224b6ef9a2ff10be57bf4058133904eb10775d47eae08b5eb0af55f

  • SSDEEP

    49152:fqiGrsqIumZFbF19liB3P56q3YjhBXxX02UlrtoCmoDPf3muri3r8wZ:fqi9JPZHlK8KYFBSJhDH3Hgr

Malware Config

Extracted

Path

C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Dear Management of BRON TAPES! We inform you that your network has undergone a penetration test, during which we encrypted your files and downloaded more than 1250 GB of your and your customers data, including: Confidentional documents Copy of some mailboxes Accounting SQL Servers Databases Databases backups Marketing data We understand that if this information gets to your clients or to media directly, it will cause reputational and financial damage to your business, which we wouldn't want, therefore, for our part, we guarantee that information about what happened will not get into the media (but we cannot guarantee this if you decide to turn to third-party companies for help or ignore this message). Important! Do not try to decrypt the files yourself or using third-party utilities. The only program that can decrypt them is our decryptor, which you can request from the contacts below. Any other program will only damage files in such a way that it will be impossible to restore them. You can get all the necessary evidence, discuss with us possible solutions to this problem and request a decryptor by using the contacts below. Please be advised that if we don't receive a response from you within 3 days, we reserve the right to publish files to the public. Contact me: [email protected] Additional ways to communicate in tox chat https://tox.chat/ contact our tox id: 7229828E766B9058D329B2B4BC0EDDD11612CBCCFA4811532CABC76ACF703074E0D1501F8418
URLs

https://tox.chat/

Signatures

  • Renames multiple (8038) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deebdc98c7394419d6493a4226b56c7d.exe
    "C:\Users\Admin\AppData\Local\Temp\deebdc98c7394419d6493a4226b56c7d.exe"
    1⤵
    • Drops startup file
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\fivjashxluajd.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\sc.exe
        SC QUERY
        3⤵
        • Launches sc.exe
        PID:2292
      • C:\Windows\SysWOW64\findstr.exe
        FINDSTR SERVICE_NAME
        3⤵
          PID:4480
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\kjcybbietfibhueaudo.bat
        2⤵
          PID:1104
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\dbawjncnprmi.bat
          2⤵
            PID:4636
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\jquuxj.bat
            2⤵
              PID:3640

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\HOW TO RESTORE YOUR FILES.TXT

            Filesize

            1KB

            MD5

            e621a1693a5b3aaa592cc1aac17ec379

            SHA1

            41b91ea43ee5d6cf6c34af7d6d550d74dfc2498f

            SHA256

            159164390ad6c97c07fbcaf2accacc07eb034e54382c8292644e5ec1110f0f1c

            SHA512

            78b4066b98af72dae67402701afacf9a174919cc4fb244d1cb79ac3a32efaf0996666e21abb40d723103895ec80a81df0f83932c7d6d8286533508c31c6a1c78

          • C:\Users\Admin\AppData\Local\Temp\dbawjncnprmi.bat

            Filesize

            47B

            MD5

            2202e846ba05d7f0bb20adbc5249c359

            SHA1

            4115d2d15614503456aea14db61d71a756cc7b8c

            SHA256

            0965cb8ee38adedd9ba06bdad9220a35890c2df0e4c78d0559cd6da653bf740f

            SHA512

            cd6ce6d89a8e5f75724405bc2694b706819c3c554b042075d5eb47fdb75653235160ac8a85e7425a49d98f25b3886faaaec5599bcf66d20bf6115dc3af4ba9c7

          • C:\Users\Admin\AppData\Local\Temp\fivjashxluajd.bat

            Filesize

            43B

            MD5

            55310bb774fff38cca265dbc70ad6705

            SHA1

            cb8d76e9fd38a0b253056e5f204dab5441fe932b

            SHA256

            1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d

            SHA512

            40e5a5e8454ca3eaac36d732550e2c5d869a235e3bbc4d31c4afa038fe4e06f782fa0885e876ad8119be766477fdcc12c1d5d04d53cf6b324e366b5351fc7cd4