Analysis

  • max time kernel
    117s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 16:20

General

  • Target

    1852d44eb949336d40a82e925b92be276813c4f5397e8387d01da753e5d6905e.exe

  • Size

    278KB

  • MD5

    8cc51af96f485b630a7d039cbb9f499c

  • SHA1

    f6fb6fc2a9b0722adba145f5dbe4ae7792c898ab

  • SHA256

    1852d44eb949336d40a82e925b92be276813c4f5397e8387d01da753e5d6905e

  • SHA512

    dbbe299f173373ff4e3ddc306323d5186b06f207718a5ac7148e6b04f838d0041df3f50ff81313b6937db3f4a5adaaa2aef505839acef2162be4e926fbd3bc5e

  • SSDEEP

    6144:gDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzp:mh1Lk70TnvjcbphQ

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>GGSW14mRkPPW0gNr2gQklz7HiseLDhnegOd0C/eHY7IphcZTv7rOMVrzP/uhujDDlSHXX0E102/pEjkMrldSb9jHBE3G2so1k5miRy/njFb4Uy3eemyvrL49oa3QCD9isSbesUh/kNpE7V07Ih9hi6Bp/5aoUiu3BZ4eiFJftHPo+9Adt7fBNtlEugfV68MLiuxvNDgMhpt/DHS/9P4zYxKPCH1FrQ8cLVzG5MAQ0VwdGA4U35/1B03yjA8Nh0r7V8g0JTyJBydJ65Gn20d9yDP5PI+Hyd7vyK7EaTBC/4bSYyF7gCUv4YDQ2oPJlp4p3vTIGWHKEivvLvlL9SYRtg==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Renames multiple (790) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1852d44eb949336d40a82e925b92be276813c4f5397e8387d01da753e5d6905e.exe
    "C:\Users\Admin\AppData\Local\Temp\1852d44eb949336d40a82e925b92be276813c4f5397e8387d01da753e5d6905e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\lBgQgz.exe
      C:\Users\Admin\AppData\Local\Temp\lBgQgz.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\3315417c.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2452
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML

    Filesize

    1KB

    MD5

    7f36d5896ccbafa93e1e3a033390a95a

    SHA1

    cbbf596c9742278c2f1dc487294e09902fdf6fe1

    SHA256

    5dfa1bc943a3d263b543b1a7841e69157c6decab13154c07bf3022458726a068

    SHA512

    ccca113605628751d800a8302873455e84fa48a1b4be3449d878c43e0d4bc9f1444c93d62af278c47cd3f5ae326aa635e59f0050534f5fe0c3b127f24ddd3b57

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    ad374b05f3fe94c65b8458bd1945744a

    SHA1

    f22c84d60ab2bcaeef68f85c4d4dbf422bab11f0

    SHA256

    22582d851da80a27ce768efca63946e4b41a8a873a0f21b464c3eac5bca83929

    SHA512

    3b1bdd40026b33fab2e8b5d93d88af20010ffd6c2e2e8fe723d2434e6a398d8867d4af356da69d7b53213b08df3f3a7baadf2f1fc7c862ba2c7de3024f3ab71d

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    884290e16b6490b606d256ce288970bc

    SHA1

    423bdecfe24ecf6e800363c9e5c4d4b8664f28ea

    SHA256

    0031b8e70d02871b17d31e4c1f1f2c182aa1bda61670a78d98d944bb4cab9a29

    SHA512

    11585f571430d6381b5fd2673e323f1a11ac2a2acdcda2a2e7469ea7b0a73b5fd0c7c7fe92e9fa117139721548dda748d245c0dae7e927de83e2324d783da139

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    beff2a8ef89951ccef73586ec286ef2a

    SHA1

    2af1ddad7b932edeaaf8e03ddbef37a2d8465ee5

    SHA256

    79a37a06324fd2315c3e0deb7bcfcd3a2e98fcbf1483b84b874e69d0442724f9

    SHA512

    e7756586f406b3193d46a1c7b3561b5fd25c425b44b67418bf99c5d00e5d583477ef9699b81760d743729a95f1145be08c2ae07a762e182e3dd64148b2a22929

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    c40defb9569f5ad0e50a8a70719e2b3f

    SHA1

    30e1d87492c30f186f22b2934dafeb6155a52aaa

    SHA256

    a96dc7f14b23de43e86c1baf52d5435c161ddcbd0da3634235069a6e69486b60

    SHA512

    77bafd160982284916a67881847acd3fb43c8bbd8ae61c24efe622d3b0cbbd6cc021379e70d032ef5d8d207896168bbe5430a7d86be0c39532600026f25bde5b

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    31dc35619df063493a314d27c40be961

    SHA1

    701fb8daa87206df4887be179e14b6f2a5868e50

    SHA256

    85100cd79f2ae24241033aaaf85d3745910e1b7b6a59c0bf08b52995c962fa92

    SHA512

    1311ee28c40a2c796ca9890a43f5e9ed759a161557cb21e5d9da79b1b430ef0688ef45822db34f99ecdf562838813e673abb83bf4a50eb3ed67633b7f29686ec

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    6849ea5c6eb996d55e1023d7bb3056d6

    SHA1

    f8ceb94aa0b8309e0c8545f7bb192658719e168f

    SHA256

    1908a49a143833213ee82c871ac28782e3aa7de95c777c62c7562b40fb05c473

    SHA512

    dd30870f7300a84ee027b7db98e67966f7cf72a311f222eab08953d81ecca7c178cc81b259efb27b3f14525cf38868f2d1bdbdb6885f98f61602ffd237eff18a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\k2[1].rar

    Filesize

    4B

    MD5

    d3b07384d113edec49eaa6238ad5ff00

    SHA1

    f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

    SHA256

    b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

    SHA512

    0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

  • C:\Users\Admin\AppData\Local\Temp\3315417c.bat

    Filesize

    187B

    MD5

    17d8084b4892d9dfe5431c714879f454

    SHA1

    8ff7b3a32c0ac1dcaeaaac4648b2a71ba7dbf97a

    SHA256

    147e1123f6c2c2bb45a22a43c2534bdaf0b7a117a8369efd1bc4288ea2836f96

    SHA512

    81a17b6a84757078da0c8d3a84703d7470a28030504957d2ff45882c30f9c8f29892061817391ddee79e3832df647a0493e9127040d8ff30b4c06a0e06fc7051

  • C:\Users\Admin\AppData\Local\Temp\5BBB0F53.exe

    Filesize

    4B

    MD5

    20879c987e2f9a916e578386d499f629

    SHA1

    c7b33ddcc42361fdb847036fc07e880b81935d5d

    SHA256

    9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

    SHA512

    bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

  • C:\Users\Admin\AppData\Local\Temp\lBgQgz.exe

    Filesize

    15KB

    MD5

    f7d21de5c4e81341eccd280c11ddcc9a

    SHA1

    d4e9ef10d7685d491583c6fa93ae5d9105d815bd

    SHA256

    4485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794

    SHA512

    e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3

  • \Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • memory/580-198-0x0000000000C10000-0x0000000000C1C000-memory.dmp

    Filesize

    48KB

  • memory/688-186-0x0000000000850000-0x0000000000859000-memory.dmp

    Filesize

    36KB

  • memory/688-12-0x0000000000850000-0x0000000000859000-memory.dmp

    Filesize

    36KB

  • memory/2164-51-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-25-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-81-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-144-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2164-145-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2164-80-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-77-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-75-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-73-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-69-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-67-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-65-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-61-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-57-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-55-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-29-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-47-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-45-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-41-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-37-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-35-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-33-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-27-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-83-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-23-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-71-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-63-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-59-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-53-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-49-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-21-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-43-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-40-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-32-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-20-0x0000000001F30000-0x0000000001F5B000-memory.dmp

    Filesize

    172KB

  • memory/2164-188-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2164-189-0x000000007460E000-0x000000007460F000-memory.dmp

    Filesize

    4KB

  • memory/2164-190-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2164-191-0x00000000020E0000-0x00000000020EE000-memory.dmp

    Filesize

    56KB

  • memory/2164-19-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2164-18-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2164-17-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2164-16-0x0000000001F30000-0x0000000001F62000-memory.dmp

    Filesize

    200KB

  • memory/2164-15-0x00000000003D0000-0x0000000000402000-memory.dmp

    Filesize

    200KB

  • memory/2164-14-0x000000007460E000-0x000000007460F000-memory.dmp

    Filesize

    4KB

  • memory/2164-10-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/2164-11-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/2164-0-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB