Resubmissions

03-07-2024 22:59

240703-2yn7wszhlp 10

03-07-2024 16:13

240703-tn93lsyglf 10

03-07-2024 16:11

240703-tm84xsyfma 10

10-05-2024 16:25

240510-tw1h5shh47 10

24-08-2023 11:16

230824-nda8msdf8z 10

Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 22:59

General

  • Target

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

  • Size

    669KB

  • MD5

    ead18f3a909685922d7213714ea9a183

  • SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

  • SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

  • SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • SSDEEP

    6144:bLUHLyHlwFjxDi2nEZkQ4NXxp0XMgkBWPqdN/jGdfYY7SRA7j4YlvfYAAjJ:4uFi02nEZh4jp0XLuxGdgTm73vL

Malware Config

Extracted

Path

C:\Users\Public\Documents\_readme.txt

Ransom Note
ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-T9WE5uiVT6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 046Sdsd3273yifhsisySD60h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
URLs

https://we.tl/t-T9WE5uiVT6

Signatures

  • Renames multiple (196) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 32 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
    "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\6cf5b53b-263a-475f-b27c-a83bd6d5f5cd" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:4936
    • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsNotTask
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3848
        • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 3848 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3488
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 1612
            5⤵
            • Program crash
            PID:3056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 1612
          4⤵
          • Program crash
          PID:5032
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 1300 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 2128
      2⤵
      • Program crash
      PID:4572
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3404 -ip 3404
    1⤵
      PID:4388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3488 -ip 3488
      1⤵
        PID:700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3848 -ip 3848
        1⤵
          PID:4452

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Network\Downloader\edbtmp.log

          Filesize

          1.3MB

          MD5

          f782b09fd215d3d9bb898d61ea2e7a37

          SHA1

          a382348e9592bdf93dd10c49773b815a992fa7c7

          SHA256

          7bd4646090dff9875e08ea00e5727b11be19fcb850344856e66360c152835694

          SHA512

          9342bd7a0cbabd7e699ea545897a6403371a0034e4bea067a9662dad9e492c5fa9b27efa4c850e1c001c79d6a76ffe0dacb6831010e41c8d5e2a92bd5b898606

        • C:\ProgramData\Package Cache\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}v48.108.8828\dotnet-host-6.0.27-win-x64.msi

          Filesize

          736KB

          MD5

          c3c0fe1bf5f38a6c89cead208307b99c

          SHA1

          df5d4f184c3124d4749c778084f35a2c00066b0b

          SHA256

          f4f6d008e54b5a6bac3998fc3fe8e632c347d6b598813e3524d5489b84bd2eaf

          SHA512

          0f3e96d16c512e37025b04ff7989d60126c3d65fe868dbcfbeae4dac910ce04fc52d1089f0e41ce85c2def0182a927fdcc349094e74cdd21b45a42fde7f01806

        • C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi

          Filesize

          180KB

          MD5

          b2e47100abd58190e40c8b6f9f672a36

          SHA1

          a754a78021b16e63d9e606cacc6de4fcf6872628

          SHA256

          889217bcb971387bc3cb6d76554646d2b0822eceb102320d40adf2422c829128

          SHA512

          d30da8c901e063df5901d011b22a01f884234ddddd44b9e81b3c43d93a51e10342074523339d155d69ff03a03a1df66c7d19e0137a16f47735b5b600616ca2a9

        • C:\ProgramData\Package Cache\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}v56.64.8781\dotnet-runtime-7.0.16-win-x64.msi

          Filesize

          26.0MB

          MD5

          078fdfc06d675c9476796f61e8d8b396

          SHA1

          183e0f30aad003e5443fc282813f349ebd7bb1c8

          SHA256

          71474bbf9ec8997bb0ec65853cb095b000f1cdd52aa3f53b486a994588a4b7f7

          SHA512

          ec1b7bb3993e7022b600557fb63f405cca68fa269ebf9cebb4c699c7e35ac3bdafac44c12b60b67c01987d499023a2b5cfea0bdb66684eff4d67546ec5952a68

        • C:\ProgramData\Package Cache\{E634F316-BEB6-4FB3-A612-F7102F576165}v48.108.8836\windowsdesktop-runtime-6.0.27-win-x64.msi

          Filesize

          28.5MB

          MD5

          01bc6dc2e63ba4656e64f83debbc1f4e

          SHA1

          823cb85a326995b562bd02e26996a4a841795322

          SHA256

          b96e7138eee33474e5ec02c855673b56f78f0773d10fb962b7c9d015597db689

          SHA512

          90f0a9df306c83c3c10cdc7cb03110bb75796b3462a3562743a5a4cf9366d85e157cdf7b60bf6458051a0deec9275ae30fc49d19f83aebaae01ec908b3335175

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          1KB

          MD5

          2365869258df7a66a2121b802ca4afd9

          SHA1

          73acc30a2edeb9d6830de559bb8a74f35168135d

          SHA256

          d6b1932822bbd72a8e78c771717d992142348f67d625a42393719fefbe59b0ed

          SHA512

          795004bab536e128dbd81c188976d37c7b650efbfa5a80374df4c65a1049c27658f4620b7605583928eb167fcb69b4c99e4c8730c507b824a7bde9c7fb0e21f4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          436B

          MD5

          1bfe0a81db078ea084ff82fe545176fe

          SHA1

          50b116f578bd272922fa8eae94f7b02fd3b88384

          SHA256

          5ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f

          SHA512

          37c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          c094c6bd2ac2a07d0bbe86a37ba79d8a

          SHA1

          ecdd646809589451cf7e88a47eba603c01e21d38

          SHA256

          c353fea86bd59ddbdbf61f8f29d8c40fae77bb879cdf3d0cacb0d6c91e49be40

          SHA512

          71b552a69f5f88e9eeff23bf708c5d07cca218e8514faa884d77ec533cfcdb618bfccc9f8a0aa7238562a3cf07e18d0f6085b6c4cd35fdf68111fdf1e2bcb864

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          170B

          MD5

          4e1f498611b4c31e888a1574fc475199

          SHA1

          4760943a8ef8780d953e79b05b1f9d28c47c3cf4

          SHA256

          af42c59fc90c54c727249c4b7e230c80dfbaf1cdb2016a9da332ae5f2da6641a

          SHA512

          cb46dd5f9b1e7fe8e7b6de28e17ff6a66b409cc2cebc75388952fea6acdcc097c06068d3f0a25cfe21063dafdddb4dee8dbd3c000c043a08256369118e94e4f8

        • C:\Users\Admin\AppData\Local\6cf5b53b-263a-475f-b27c-a83bd6d5f5cd\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

          Filesize

          669KB

          MD5

          ead18f3a909685922d7213714ea9a183

          SHA1

          1270bd7fd62acc00447b30f066bb23f4745869bf

          SHA256

          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

          SHA512

          6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

        • C:\Users\Public\Documents\_readme.txt

          Filesize

          1KB

          MD5

          d75064cfaac9c92f52aadf373dc7e463

          SHA1

          36ea05181d9b037694929ec81f276f13c7d2655c

          SHA256

          163ec5b903b6baadd32d560c44c1ea4dce241579a7493eb32c632eae9085d508

          SHA512

          43387299749f31c623c5dd4a53ff4d2eff5edfeb80fd4e2edd45860b5c9367d2767ae2ee9b60824b57301999dd2bd995b7d3bd5e7187e447aed76106272559d1

        • memory/1300-26-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1300-19-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1300-27-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1300-30-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1300-14-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3404-0-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3404-17-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/3404-16-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3404-3-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/3404-2-0x0000000000700000-0x0000000000800000-memory.dmp

          Filesize

          1024KB

        • memory/3488-39-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3488-46-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3488-47-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3848-28-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3848-48-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3848-44-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3848-33-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3848-32-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4584-45-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4584-29-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB