Analysis

  • max time kernel
    131s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 01:34

General

  • Target

    d12c35c8825aad5b09855a89102236774ca847a7559132c4e9d92aaf69772815.exe

  • Size

    146KB

  • MD5

    ef531da468065fc649d072824c9a76e2

  • SHA1

    93c35e2e7f4915645479f6ae680683dcb3d9bc54

  • SHA256

    d12c35c8825aad5b09855a89102236774ca847a7559132c4e9d92aaf69772815

  • SHA512

    4c212df24e00fb7d93a5d26f27c3c0628cd7dbea67d7ee72844d1de5d6c5713860e423a01a8226da825882507f5982a06d01d8677e8bb26c66a43f131dac7894

  • SSDEEP

    1536:IzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDjkxB81Hd8lQG9XtPmSQVwpdNIQ:XqJogYkcSNm9V7DjQPQGfjLpjIa1tT

Malware Config

Extracted

Path

C:\xgU6NOijB.README.txt

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED!!! All your files, documents, photos, databases and other important files are encrypted. The only way to recover your files is to use a decryptor. To get the decryptor, write to us by mail or telegram, specify the ID of the encrypted files in the letter: Email: [email protected] Telegram: https://t.me/bit_decryptor Warning. * Do not rename encrypted files. * Do not attempt to decrypt data using third party software as this may result in permanent data loss. * Do not contact other people, only we can help you and recover your data. Your personal decryption ID: 8F1D8AE5590CFFAA918C012737F81B59
URLs

https://t.me/bit_decryptor

Signatures

  • Renames multiple (651) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d12c35c8825aad5b09855a89102236774ca847a7559132c4e9d92aaf69772815.exe
    "C:\Users\Admin\AppData\Local\Temp\d12c35c8825aad5b09855a89102236774ca847a7559132c4e9d92aaf69772815.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\ProgramData\E08C.tmp
      "C:\ProgramData\E08C.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\E08C.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\EEEEEEEEEEE

          Filesize

          129B

          MD5

          42eac0ca831de7e8e7f4d1f128130046

          SHA1

          89f19a9b3b42bd020219f7e794e53ad16f06b91b

          SHA256

          74cc295b040861aa24533b4d31c412c67925d5e60add8e8d205bc0c31f6e3969

          SHA512

          13215e0c977f9fa7b8b10916a85e061a3b620d6f7da5ba3cb6695fb4ca69f496cd8002bbd08c6f097f769b0311bf1dac24ba3165944e9a5b878e2b1977189b96

        • C:\ProgramData\E08C.tmp

          Filesize

          14KB

          MD5

          294e9f64cb1642dd89229fff0592856b

          SHA1

          97b148c27f3da29ba7b18d6aee8a0db9102f47c9

          SHA256

          917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

          SHA512

          b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

        • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

          Filesize

          146KB

          MD5

          285c6ef17de5d76f324c95731cf43b76

          SHA1

          fb35389b62a0b9db0a0159a5f46ddcb7a74a6a94

          SHA256

          99b61cf1f5ca2ddeeb65192857fb3fb88a54ba70e171e223291df355e393c697

          SHA512

          0af5bf4839d4adc53b6dc69dec3791d15d61a7b217e1d48c724793d2d63c5d756a27e85ae48a0d496edfe0a0a757ad7c2f15b0ccaf626295f1142d7610aa48c2

        • C:\xgU6NOijB.README.txt

          Filesize

          659B

          MD5

          678abc449922b099139203ffb3dcc120

          SHA1

          7a9f866ada2ef875e3b538b2b6cc6eb601615b4f

          SHA256

          e776efca5c5f3bd20aa87dbf9ab4022f75710e4f4cf1af25ec3785189bfe5c02

          SHA512

          2fbef029b792714d8a347ed1b06269aa8f2be6bbe7853e1b3535f5fe0e6027ca4e0b69b211588b36bf12e71f7cd479d8330ebc232ae680f14b6a880955065377

        • F:\$RECYCLE.BIN\S-1-5-21-2392887640-1187051047-2909758433-1000\DDDDDDDDDDD

          Filesize

          129B

          MD5

          5e0d3be926e405e7134b023a8b88ce88

          SHA1

          16f5f6a2e409c14539269c8e123746b703ca092c

          SHA256

          cad81d13560926d1265626b0f4090c4b55af02130ab90afc8a86c1be35445edb

          SHA512

          6d06e3fbf3db686a27039e7ddd0a92ae367ee9b554f6ae481d3431fad9c7ecad80e969e59266cc35521ff1016277a5f61fcd7d799f1efc4e68e3ac01f44e04d2

        • memory/2028-1-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

          Filesize

          64KB

        • memory/2028-2-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

          Filesize

          64KB

        • memory/2028-0-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

          Filesize

          64KB

        • memory/4632-2878-0x000000007FE20000-0x000000007FE21000-memory.dmp

          Filesize

          4KB

        • memory/4632-2877-0x00000000026A0000-0x00000000026B0000-memory.dmp

          Filesize

          64KB

        • memory/4632-2876-0x00000000026A0000-0x00000000026B0000-memory.dmp

          Filesize

          64KB

        • memory/4632-2875-0x000000007FE40000-0x000000007FE41000-memory.dmp

          Filesize

          4KB

        • memory/4632-2879-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

          Filesize

          4KB

        • memory/4632-2909-0x000000007FE00000-0x000000007FE01000-memory.dmp

          Filesize

          4KB

        • memory/4632-2908-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

          Filesize

          4KB