Resubmissions

11-06-2024 09:53

240611-lwmnaaseqh 10

11-06-2024 09:47

240611-lsfesssdqh 10

Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 09:47

General

  • Target

    1.exe

  • Size

    447KB

  • MD5

    9823800f063a1d4ee7a749961db7540f

  • SHA1

    9d2917a668b30ba9f6b3e7a3316553791eb1c052

  • SHA256

    a9524de985a3ecc43e11dd7c051a4bbfe08c3d71cde98ea9bb6ea7f32c0cb174

  • SHA512

    c48624e32dba7f08ce0ca8267e541b123c6a9bf848b81d9e62f7fc4bec9b8ed801a6204ffaece4decf0d31bf2595867ff6f8c0b176e366848b61145cc585e41e

  • SSDEEP

    12288:Yn+KS3UINuBGCz0SxWUNmH2o8PXwU9Eq7zKloxTwRtjauqCXy3X:Y+FUKWAHNqXwUlzD9w7PqCin

Malware Config

Extracted

Path

C:\$Recycle.Bin\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\system32\wbem\wmic.exe
      "C:\k\..\Windows\xhfx\gklf\nysx\..\..\..\system32\vtvuu\..\wbem\riqje\uusq\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2888
    • C:\Windows\system32\wbem\wmic.exe
      "C:\w\m\j\..\..\..\Windows\fis\t\..\..\system32\f\..\wbem\uwpu\xwmj\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2716
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2476
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\DECRYPT-FILES.html

      Filesize

      6KB

      MD5

      4f2f870ebe1a7b1a11a0980f43a707d2

      SHA1

      aa649f1562e0276796dbd7d0d18be57b640c1404

      SHA256

      40e9ac8e55c4a54a5cd239dba933ab229eb5bbccd2031abd2b912bed147ad0e6

      SHA512

      48a4c5fc9efcda5b3b3e886fc1b616dbf367d0cd998b100429da9e310f28aa32ff915c62b6020821030536a756d84b2f8cdb8b2b7a4e105bc92647212e16555e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_3478803ECE304549A93692129C440131.dat

      Filesize

      940B

      MD5

      871ce001718c255cdef77ded5201e209

      SHA1

      1935107b1b0cb246cd9dec41447e4a6e4c7465df

      SHA256

      811ed77405b73b73b745745c2f8679a16394a131468697ef0b27ccc3cd563e21

      SHA512

      dbc35a9e5b875e32a5d6277104d1e62f17ce6cadaf33c0b2dea59aa3fedcfb2808b8ef380c418e08b56c250fe25fd13deb9063621aef73dd9f2b274c5aeaf22d

    • memory/2092-0-0x0000000000170000-0x00000000001C9000-memory.dmp

      Filesize

      356KB

    • memory/2092-1-0x00000000003F0000-0x000000000044A000-memory.dmp

      Filesize

      360KB

    • memory/2092-5-0x00000000003F0000-0x000000000044A000-memory.dmp

      Filesize

      360KB

    • memory/2092-9-0x00000000003F0000-0x000000000044A000-memory.dmp

      Filesize

      360KB

    • memory/2092-10-0x00000000003F0000-0x000000000044A000-memory.dmp

      Filesize

      360KB

    • memory/2092-14-0x00000000003F0000-0x000000000044A000-memory.dmp

      Filesize

      360KB

    • memory/2092-1751-0x00000000003F0000-0x000000000044A000-memory.dmp

      Filesize

      360KB