Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 06:44

General

  • Target

    1a130d16a9e828cccb6a2135cbd7f1615219979612e0bae67cbe7c9a9606cf51.exe

  • Size

    501KB

  • MD5

    bf55c921b638ddf41a5120c90fe5f211

  • SHA1

    6a96dd8be36381d71eb7dac5f7a053064b546487

  • SHA256

    1a130d16a9e828cccb6a2135cbd7f1615219979612e0bae67cbe7c9a9606cf51

  • SHA512

    a3d91c51eb3bd59792f6cca32def989b4d069e489dcb74263f5f629fe300f4074b1a7d8a7a64410d7efc992e1d332108147aa0b2611e0777358749d7adfac166

  • SSDEEP

    12288:bGlEhiu/o/eXUG8nfBG5K92Qg+fgFfwjUKWXNDtn0lF620D4JNuq6JFcP:bGei/mUNaK9259wjU3dt0lF6264JArJs

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\!nissenvelten!HOW_TO_RESTORE.log

Family

rook

Ransom Note
Hello! We warned you, but you even didn't replied Forced shutdown of devices can lead to the loss of all data. Do not forcibly disconnect storage volumes from hosts, don't interrupt process. Damaged information cannot be recovered. All data is properly protected against unauthorized access by steady encryption technology. We have downloaded essential data of company: - Huge amount of files, including: HR,Financial,Accounting,... - Large amounts of personal records of your employees and residents. - about 1TB (!!!) of data! In case if you refuse to cooperate with us, all essential data will be sold or published at dark marketplace. Full details and proofs will be provided in case of contacting us by following emails. [email protected] [email protected] It's just a business. We can help you to quickly recover all your files. We will explain what kind of vulnerability was used to hack your network. If you will not cooperate with us, you will never know how your network was compromised. We guarantee this will happen again. We can decrypt 2 small files (up to 1MB) for free. Send files by email. Register new email account at secure mail service like mailfence, protonmail to be sure that outgoing email not blocked by spam filter. Don't use gmail! WARNING! Don't report to police. They will suspend financial activity of company and negotiation process. �

Signatures

  • Rook

    Rook is a ransomware which copies from NightSky ransomware.

  • Renames multiple (6455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a130d16a9e828cccb6a2135cbd7f1615219979612e0bae67cbe7c9a9606cf51.exe
    "C:\Users\Admin\AppData\Local\Temp\1a130d16a9e828cccb6a2135cbd7f1615219979612e0bae67cbe7c9a9606cf51.exe"
    1⤵
    • Drops file in Program Files directory
    PID:648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\!nissenvelten!HOW_TO_RESTORE.log
    Filesize

    1KB

    MD5

    1ac13e1c2b35dfaf377ceb55e61e5309

    SHA1

    e53185eee04a0578483054e507d639be2635b4d7

    SHA256

    72e9a50a52585a25c5529b846cf586946694e46a912a97b526e4a7067ab1d7e6

    SHA512

    fa702569f13d82d24e78cba21397f0d53281c0a93db7a484bb974f4cb965da23dd4691c7061de6bfd54e40d5d32faa2e8b8af52968191b91f9164f5c7d459fa6

  • memory/648-8-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-1-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-4-0x00000000005C0000-0x00000000005C1000-memory.dmp
    Filesize

    4KB

  • memory/648-7-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-6-0x0000000000401000-0x000000000043C000-memory.dmp
    Filesize

    236KB

  • memory/648-5-0x0000000000660000-0x000000000069F000-memory.dmp
    Filesize

    252KB

  • memory/648-3-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-0-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-2-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-3405-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-7628-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-9265-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-9679-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/648-9681-0x0000000000401000-0x000000000043C000-memory.dmp
    Filesize

    236KB

  • memory/648-9680-0x0000000000660000-0x000000000069F000-memory.dmp
    Filesize

    252KB