Resubmissions

13-07-2024 09:54

240713-lxbx6swdmm 10

13-07-2024 09:50

240713-lvbvdsyapd 10

13-07-2024 09:46

240713-lr1dksyajd 10

Analysis

  • max time kernel
    839s
  • max time network
    841s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 09:50

General

  • Target

    020db58e3c552ead23b18bb04bb75781e51347dab4868d1fc55e2854a6647d4c.exe

  • Size

    1.3MB

  • MD5

    ffce3f25a125b5dfcd96e92148b7d209

  • SHA1

    a4c2bfa23b98471ac1ea7103e194cf6488a058ac

  • SHA256

    020db58e3c552ead23b18bb04bb75781e51347dab4868d1fc55e2854a6647d4c

  • SHA512

    7d0af9214e4cdabceab9abb2586288e0a42ef9b7a7abc1bc7f03c04cf48b6722eeeee4a476aaf2567feaacbc70fb3e6bf36aa1050b010ef68019b7e80886f823

  • SSDEEP

    24576:1pa1z++i/OfNbXirk1nF1qfWk3w80geAcVW9CFnBOmp7BCr/otH5LSp+7I80w:zF+BZk6FnBOmp7BCr/G7I80

Malware Config

Extracted

Path

C:\Users\Admin\Documents\How Do I Recover My Files (Readme).txt

Ransom Note
* What happened to my files? Your important files are encrypted. Many of your documents, photos, videos, databases, and other files are no longer accessible because they are encrypted. Maybe you're busy finding a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. However, if you want to use the programs of data recovery companies, please do not work on your original files, but make copies of them. Corruption of the actual files can cause irreversible damage to your data. * Can I Recover My Files? Sure. We guarantee that you can recover all your files safely and easily. But for this you need to send $300 worth bitcoins to our address. Even if you give money, Do not believe the people around you who say they will not give your files, I Have Enough Reference To Give You Confidence. I don't know about you, so there is no point in having bad feelings towards you, doing evil to you, my goal is just to earn an income from this business. * What about the guarantees? This is just a job. We never care about you and your deals. If we do not fulfill our work and obligations - no one will cooperate with us. If you do not believe us, tell us any 1 or 2 files with SIMPLE extensions (jpg, xls, doc, etc ... not databases!) And low size (max 1 mb) 1 or 2 file and following special public and private mzrevenge keys produced for you send us we will decrypt these files and send it back to you. This is our guarantee. * How to contact with you? You can write us to our mailbox: [email protected] Don't forget, check your "Spam" or "Junk" folder it you can't get more than 6 hours of answer. * How will the decryption process proceed after payment? After payment, we will send you our special decoder program by mail, just open it, then it will automatically decrypt all your files. but you need to pay for it and contact us. * So what is Bitcoin and how to get it? The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ If you are ready to pay the money we want, Bitcoin address to which you will send the payment: 3HYoqfBS1ZceA2AvmdEucbnEHp74nu9cjd These are public and private MZREVENGE decryption keys produced for you. If these keys are damaged, nobody can recovery your files. ============================{ PUBLIC MZREVENGE KEY }============================= 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 ================================================================================= ============================{ PRIVATE MZREVENGE KEY }============================ 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 =================================================================================
Wallets

3HYoqfBS1ZceA2AvmdEucbnEHp74nu9cjd

Signatures

  • UAC bypass 3 TTPs 4 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (237) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\020db58e3c552ead23b18bb04bb75781e51347dab4868d1fc55e2854a6647d4c.exe
    "C:\Users\Admin\AppData\Local\Temp\020db58e3c552ead23b18bb04bb75781e51347dab4868d1fc55e2854a6647d4c.exe"
    1⤵
    • UAC bypass
    • Drops file in Drivers directory
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C sc config "AppCheck" start=disabled
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\sc.exe
        sc config "AppCheck" start=disabled
        3⤵
        • Launches sc.exe
        PID:1564
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2216
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\How Do I Recover My Files (Readme).txt
      2⤵
        PID:2264
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\How Do I Recover My Files (Readme).txt

      Filesize

      5KB

      MD5

      7d29409fa615d234d183282c3fb3fdc6

      SHA1

      79fbe605791c4b7f810fb14c8a42753ec3f35ee2

      SHA256

      f42821757a290dcf8e1977bfb75949c0e62705c30f13a65fb6cb05e412b12bcc

      SHA512

      c89eb91da28d1174f838660a5a60445897738b6dfc89f6495b967497feb776991084944c3c50f2cd3e8c1c4a73aa58c3952968340d0393a16d068aa7c53039b0

    • memory/2188-489-0x0000000000400000-0x0000000000561000-memory.dmp

      Filesize

      1.4MB