Resubmissions

11-06-2024 09:53

240611-lwmnaaseqh 10

11-06-2024 09:47

240611-lsfesssdqh 10

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 09:47

General

  • Target

    1.exe

  • Size

    447KB

  • MD5

    9823800f063a1d4ee7a749961db7540f

  • SHA1

    9d2917a668b30ba9f6b3e7a3316553791eb1c052

  • SHA256

    a9524de985a3ecc43e11dd7c051a4bbfe08c3d71cde98ea9bb6ea7f32c0cb174

  • SHA512

    c48624e32dba7f08ce0ca8267e541b123c6a9bf848b81d9e62f7fc4bec9b8ed801a6204ffaece4decf0d31bf2595867ff6f8c0b176e366848b61145cc585e41e

  • SSDEEP

    12288:Yn+KS3UINuBGCz0SxWUNmH2o8PXwU9Eq7zKloxTwRtjauqCXy3X:Y+FUKWAHNqXwUlzD9w7PqCin

Malware Config

Extracted

Path

C:\Users\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\system32\wbem\wmic.exe
      "C:\fo\..\Windows\kjmpu\..\system32\henc\k\..\..\wbem\c\q\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4976
    • C:\Windows\system32\wbem\wmic.exe
      "C:\lwh\l\h\..\..\..\Windows\law\bmev\..\..\system32\ctw\..\wbem\jy\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3924
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4640
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x340 0x33c
    1⤵
      PID:4820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_6E2CF7E8D7C6456AAF4CDEBB49446A31.dat

      Filesize

      940B

      MD5

      e6896275c24ce6ee96428b260b2e1f49

      SHA1

      3fdb0f99e453e843040d035a0335d53b96dff482

      SHA256

      9810631d516652d194e02b73caa693a2f96f2cb2f0832690dc3b7c898e8e608f

      SHA512

      1a6525c1991faa44f06f3269409dbc2a9de40ad76c77c96d8c3027bd54f064dc302934f27b876579057555192a6315f7d8236fc3a80f7a9078f02a670f44bfbc

    • C:\Users\DECRYPT-FILES.html

      Filesize

      6KB

      MD5

      f3a004037a99a158411eb8aa6a6e4e0c

      SHA1

      cac1390b911f96283d1e8478f3b246fc54699811

      SHA256

      11bf3cb866b3fd442353a0c240c7cfb8ab82a0a90574729606e7d35db8e96753

      SHA512

      8ab651df876074754b577babbc6323f7bddbc2d172617975bd57b7768328ba61e397f609bc96dc551f1dc63f1e80e592fa8cba3d93fd34f9a4d3c5a93864633c

    • memory/3404-0-0x00000000015C0000-0x0000000001619000-memory.dmp

      Filesize

      356KB

    • memory/3404-5-0x0000000001820000-0x000000000187A000-memory.dmp

      Filesize

      360KB

    • memory/3404-2-0x0000000001820000-0x000000000187A000-memory.dmp

      Filesize

      360KB

    • memory/3404-9-0x0000000001820000-0x000000000187A000-memory.dmp

      Filesize

      360KB

    • memory/3404-14-0x0000000001820000-0x000000000187A000-memory.dmp

      Filesize

      360KB

    • memory/3404-5410-0x0000000001820000-0x000000000187A000-memory.dmp

      Filesize

      360KB