Resubmissions

03-07-2024 16:04

240703-thygmaycpc 10

01-07-2024 18:12

240701-ws6xvswbkj 10

01-07-2024 18:03

240701-wm5sls1gka 10

01-07-2024 18:03

240701-wm39sa1gjf 10

01-07-2024 18:03

240701-wm2e7avhkj 10

01-07-2024 18:03

240701-wmzxcs1fre 10

01-07-2024 18:02

240701-wmzats1frc 10

01-07-2024 18:02

240701-wmvbwa1fqh 10

22-11-2023 17:02

231122-vkac9adg64 10

Analysis

  • max time kernel
    148s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 18:02

General

  • Target

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

  • Size

    669KB

  • MD5

    ead18f3a909685922d7213714ea9a183

  • SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

  • SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

  • SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • SSDEEP

    6144:bLUHLyHlwFjxDi2nEZkQ4NXxp0XMgkBWPqdN/jGdfYY7SRA7j4YlvfYAAjJ:4uFi02nEZh4jp0XLuxGdgTm73vL

Malware Config

Extracted

Path

C:\Users\Public\Documents\_readme.txt

Ransom Note
ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-T9WE5uiVT6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 046Sdsd3273yifhsisySD60h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
URLs

https://we.tl/t-T9WE5uiVT6

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
    "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\78fd1e04-10f4-4a09-b716-3fd9063ae99e" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:4092
    • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsNotTask
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 4516 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1088
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 1660
            5⤵
            • Program crash
            PID:2168
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1776
          4⤵
          • Program crash
          PID:4016
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 3976 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 804
          4⤵
          • Program crash
          PID:4936
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 1708
        3⤵
        • Program crash
        PID:1520
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 2124
      2⤵
      • Program crash
      PID:2972
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3468 -ip 3468
    1⤵
      PID:4052
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4280,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=2860 /prefetch:8
      1⤵
        PID:1660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1088 -ip 1088
        1⤵
          PID:396
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4516 -ip 4516
          1⤵
            PID:4020
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4508 -ip 4508
            1⤵
              PID:4484
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3976 -ip 3976
              1⤵
                PID:832

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Microsoft\Network\Downloader\edbtmp.log

                Filesize

                166KB

                MD5

                3f401c3e7bc66ff4ffe129ee3632f73b

                SHA1

                fd8f23e58f667bdd5b690ada05285530d6069bf6

                SHA256

                4aa46062f029299a39b1b7c1d989361e73fcba666999895f71d74792e50ee30f

                SHA512

                f228f995608f68d2361a5ee37e6ae5533bf8a495c71fff1296de8a874f2a0e403979ccd47693dfcd9eb0529fee394b151cd98d895cd47e399df382b044d09cd8

              • C:\ProgramData\Package Cache\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}v48.108.8828\dotnet-host-6.0.27-win-x64.msi

                Filesize

                186KB

                MD5

                955478d95e8b341aaaa5381af2003015

                SHA1

                d9234453ed346bde057cdda18a81d4b210740a7b

                SHA256

                233d4b184f3e7a9b2d2300571789c6d8fbb4188d51cb570ba5df6d4da5d2d49f

                SHA512

                10a64315280eb79f0760579d0db2c8ee9077e7a3af094cb27e1aefaa7d0cb0f9a74d6c47320c3ecc7eea86b0dc22fdf9c8f95eb399b3b85209a8abb00948099d

              • C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi

                Filesize

                158KB

                MD5

                6da2d2891f01df048aa575952dab0a00

                SHA1

                59eae00b2618780d2fd521edf2468ab81079913d

                SHA256

                18a23bf83108978d514c56f3c9cea4da2f9d0f660000453e7b18c59856848958

                SHA512

                ce1c3c5f7a8e2962a6fc8e7a7038700635da3a9f25bbaa88c4a9cf20421ba87a0ada5d63ea5b375f384282a1e2a1963f7d5476d3acc37d2580faf1b50313ee4a

              • C:\ProgramData\Package Cache\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}v56.64.8781\dotnet-runtime-7.0.16-win-x64.msi

                Filesize

                69KB

                MD5

                8995dfd6c8641b790b08954fcdb7ade7

                SHA1

                fa6048e08a22c21946462bf8f1ab912d3166a3f9

                SHA256

                1330a2cf290fa2031eccabd9b40a69494c74e9bf5a7a3ce06887bdd32f447836

                SHA512

                9906ad2f6013b2e239d5dbc93690adfe518f3f255f1f5408df38ade61be9e9e979d43a8c2757ea6a962bb075b988853fbafdce42e5bb3001ebfc56eb5b1aa524

              • C:\ProgramData\Package Cache\{E634F316-BEB6-4FB3-A612-F7102F576165}v48.108.8836\windowsdesktop-runtime-6.0.27-win-x64.msi

                Filesize

                59KB

                MD5

                86082100296543c665f00ae8a61a9f60

                SHA1

                2b7e6c43aeebd0491a76e0d0e9aebcea532ae7db

                SHA256

                bc5d58d6e2af253cc6ce8bd6ca82609abd141a43a2ff8dded5a4a8133e0717f9

                SHA512

                2299f098cd7d570576aeb824abc445dd670bb2350e85762b7789e2e89f93f9181d57230c35e00572b2923d233dbaa8431a71ed9b4b3d7b9287886a08d568329e

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                Filesize

                1KB

                MD5

                2365869258df7a66a2121b802ca4afd9

                SHA1

                73acc30a2edeb9d6830de559bb8a74f35168135d

                SHA256

                d6b1932822bbd72a8e78c771717d992142348f67d625a42393719fefbe59b0ed

                SHA512

                795004bab536e128dbd81c188976d37c7b650efbfa5a80374df4c65a1049c27658f4620b7605583928eb167fcb69b4c99e4c8730c507b824a7bde9c7fb0e21f4

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                Filesize

                436B

                MD5

                1bfe0a81db078ea084ff82fe545176fe

                SHA1

                50b116f578bd272922fa8eae94f7b02fd3b88384

                SHA256

                5ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f

                SHA512

                37c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                Filesize

                174B

                MD5

                8777251b2c1320017d592b220545d506

                SHA1

                55d518ee03cbc2d16595c872a9cde974f514e8b0

                SHA256

                6e758aad9acb51ffd4eb10131845ec4045e03df9056fe01629f7db7b7593eadb

                SHA512

                1073de910b71a4b6a4ac37f79e54081b93e28fc4d30f1334278d7ee39a5c41bec3649a0e9fef8ca0e6a5b8afebb5981028994f5925f67559fbffc64136470851

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                Filesize

                170B

                MD5

                90aaa9bf9ea874037449c49fc567fa10

                SHA1

                b74fcff6537aeb6381714e0c851f080908085f42

                SHA256

                1e3a7ccc765c6c5680b5fcbb4df2349d0ea3227fffd8be0d9daf916e7ecf7311

                SHA512

                f35dbaf16cf0bce2536b4ddd01e954efb0091f4a275065d3bf6557755d6727b6579c89cbd453955aecd56e9fd9588da0662a092b617c71f0c14cffc8bc1c2888

              • C:\Users\Admin\AppData\Local\78fd1e04-10f4-4a09-b716-3fd9063ae99e\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

                Filesize

                669KB

                MD5

                ead18f3a909685922d7213714ea9a183

                SHA1

                1270bd7fd62acc00447b30f066bb23f4745869bf

                SHA256

                5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

                SHA512

                6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

              • C:\Users\Public\Documents\_readme.txt

                Filesize

                1KB

                MD5

                d75064cfaac9c92f52aadf373dc7e463

                SHA1

                36ea05181d9b037694929ec81f276f13c7d2655c

                SHA256

                163ec5b903b6baadd32d560c44c1ea4dce241579a7493eb32c632eae9085d508

                SHA512

                43387299749f31c623c5dd4a53ff4d2eff5edfeb80fd4e2edd45860b5c9367d2767ae2ee9b60824b57301999dd2bd995b7d3bd5e7187e447aed76106272559d1

              • memory/1088-37-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/1088-36-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/1088-30-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3468-14-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3468-15-0x0000000000400000-0x0000000000476000-memory.dmp

                Filesize

                472KB

              • memory/3468-3-0x0000000000400000-0x0000000000476000-memory.dmp

                Filesize

                472KB

              • memory/3468-2-0x0000000000580000-0x0000000000680000-memory.dmp

                Filesize

                1024KB

              • memory/3468-0-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3976-1204-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3976-32-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3976-23-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3976-22-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3976-17-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/3976-12-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4508-34-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4508-1203-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4508-25-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4516-27-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4516-38-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4516-33-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4516-28-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB

              • memory/4516-24-0x0000000000400000-0x00000000004A9000-memory.dmp

                Filesize

                676KB