Analysis

  • max time kernel
    147s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 17:31

General

  • Target

    03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe

  • Size

    147KB

  • MD5

    6ac5cd70e043576b82a313273150f0d9

  • SHA1

    2c3b2ed20f1e8e630c61109288bd0ac64b5e0329

  • SHA256

    03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1

  • SHA512

    c77a84cc5ae2cf246278a736051baa44d1f15496547a2bfbba2cbd65e207b6e17a6b9fb4a221b4ec4286c4d80fa65709854cbd46d14a4548fbcf9fb72d01def5

  • SSDEEP

    1536:nzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDpAv5wo3Lk6eEVNAhaxlxxFmwUk:YqJogYkcSNm9V7DpKv3L35Sslxx0wT

Malware Config

Extracted

Path

C:\zpvmjd9JY.README.txt

Ransom Note
~~~AsiriumSquad~~~ >>>> Your data are stolen and encrypted. >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack worldwide and there is no dissatisfied victim after payment. >>>> You need contact us to decrypt file. buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $300. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Moonpay.com Important!: your pc, your personal life, your liberty is in danger ! take this serius if u dont pay whe Must ruin ur life otherwise no one will pay. Payment informationAmount: 0.004 BTC Bitcoin Address: bc1q07v4dm6q5ln5w3ac93ue8jdvcjmq8tg3tvlmlr Contact us with Your personal DECRYPTION ID and screenshot of PAYMENT at: [email protected] >>>> Your personal DECRYPTION ID: 8D9634EC6DA0FEAA1FDFBBBECD0D603A >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again!

Signatures

  • Renames multiple (607) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe
    "C:\Users\Admin\AppData\Local\Temp\03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:2620
    • C:\ProgramData\6D61.tmp
      "C:\ProgramData\6D61.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\6D61.tmp >> NUL
        3⤵
          PID:1244
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4204
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3132
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{E0EC5866-98AF-46E6-A792-391D62438F97}.xps" 133595766981200000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1628

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-2818691465-3043947619-2475182763-1000\HHHHHHHHHHH

        Filesize

        129B

        MD5

        4c55a46763081736b7503a2f395cc756

        SHA1

        68768b1adc0698185f22d685a3c14f5e3d289ac1

        SHA256

        8185985f2bb1ebea8c9b8467df4d05df04ef74fee4214e9ad003dd936ced9070

        SHA512

        9d7be7aa0ffb7d3304fd0317733921d012c50839663a43508db46be589188e006692913db570f121b4eb182847c655afd0d516dc2779c2ff25b3e0d21cf69f79

      • C:\ProgramData\6D61.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Temp\EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE

        Filesize

        147KB

        MD5

        d7130de45d856031807081e432b24787

        SHA1

        ddd3c0fac49e38877a64f9f41e0618c6cdca6cea

        SHA256

        31675c995896bbe60ffd8b0296b3d907f635f4a91127322a911723da3c1c7e1a

        SHA512

        a97e03ff2aa5c6051fcc511f1af73bc50bbecd4a94c27c44a01e00c871237d3b34d219181fd495387b4115b92779673bc77d5bbab3897d60e86a599127def770

      • C:\Users\Admin\AppData\Local\Temp\{82E06F94-34FA-4DCD-94D6-F5EB1309CA96}

        Filesize

        4KB

        MD5

        55de03ccb725825fa14f065a56dad9fd

        SHA1

        f52a284e969a23287bf94741642aba43c43d1a9a

        SHA256

        9754c5feac0569a7523cdfde02859b3208b8ae44e1684fa2aa91324632b782f0

        SHA512

        89fc481262be70669490ce029e8f475d33c713634e260e709cbb29a3ac61d0bace98105aceed6d800d98f0215865fcf3df4533b318b226e373676989f2db678e

      • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

        Filesize

        4KB

        MD5

        33cbe014d80706757551b170bb74ac35

        SHA1

        09c00cf6f1240d0313582fc4162957d4036b1ec2

        SHA256

        2e0c78e357342b521c379173bb21824b5a93d12c0a21bf0e3c518b57dd4e0c42

        SHA512

        fae4231ce266c0f425f8869fe895a39338fd18faed97ef0b4041ddefb1e2fce31b50e7f3df580f58f471a2f624a9082cb2f383c84edba1bb7450d852ba8ca399

      • C:\zpvmjd9JY.README.txt

        Filesize

        1KB

        MD5

        d735266e4b234ee31673c9d231a53bd4

        SHA1

        7948f43291a7e606409fcb676ee1c447c4ad83f2

        SHA256

        b685433213ef0644d948a47288cb8b5d10b4ed64e00a658a34b1f5ac757bf645

        SHA512

        cd3a1e3cbafb7f3a1cc935b14b6918fb3c27423c26ac6c822b6c9eab3c2abdadb17f11f19bc156269a226d795a1b7ae4bf25fb2b10191343311c32017abc30f3

      • F:\$RECYCLE.BIN\S-1-5-21-2818691465-3043947619-2475182763-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        56655e774f9cf3a59037cd23ce799268

        SHA1

        c783e6539469851dc52e4c22286f82c580180e72

        SHA256

        9e7c5dd20f2050e8212594afc13ee450f1c7d77b0bf7d7d9e2d4f3ebf4b24694

        SHA512

        08f0dac1444edac4d1cad17a602ff31c8facfc35c8737ce6a06eb010373ca6b6805d576cfee2f270a7f3dd648bc9e58fac0a87d27222b79e5fd9b05420d52582

      • memory/1628-2800-0x00007FFC719D0000-0x00007FFC719E0000-memory.dmp

        Filesize

        64KB

      • memory/1628-2801-0x00007FFC719D0000-0x00007FFC719E0000-memory.dmp

        Filesize

        64KB

      • memory/1628-2802-0x00007FFC719D0000-0x00007FFC719E0000-memory.dmp

        Filesize

        64KB

      • memory/1628-2804-0x00007FFC719D0000-0x00007FFC719E0000-memory.dmp

        Filesize

        64KB

      • memory/1628-2803-0x00007FFC719D0000-0x00007FFC719E0000-memory.dmp

        Filesize

        64KB

      • memory/1628-2837-0x00007FFC6F540000-0x00007FFC6F550000-memory.dmp

        Filesize

        64KB

      • memory/1628-2838-0x00007FFC6F540000-0x00007FFC6F550000-memory.dmp

        Filesize

        64KB

      • memory/3696-1-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/3696-2-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/3696-0-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB