Resubmissions

21-08-2024 19:30

240821-x76q3sweqg 10

21-08-2024 17:42

240821-v92h2avgpj 10

12-06-2024 16:01

240612-tgps4a1bqh 10

Analysis

  • max time kernel
    1433s
  • max time network
    1438s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 17:42

General

  • Target

    Mydoom Ransomwares/1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe

  • Size

    27KB

  • MD5

    4ae2e5156253fbeed2c6f13a066c98a1

  • SHA1

    db318de72c2cdda1822999441d23b91e933a772b

  • SHA256

    1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c

  • SHA512

    c00c1c47e4cffaa3078885bbca42e6663bb478ec33b5b742c752412b204af55bf94008868264d0b03279339017732330e64c52d3b20f55e347194f65f2147be2

  • SSDEEP

    384:XLNAZPBVp/L9Z1oQEDQVbfANpC78rMNAtpDkjvr+jfXNIRXrrahrBDBkHqd7gasb:XCZ5jz9YQEMb4KN2ywrFuHeJsyO

Malware Config

Extracted

Path

C:\$Recycle.Bin\How_To_Restore_Your_Files.txt

Ransom Note
[+] All Your Files Have Been Encrypted [+] [-] Do You Really Want To Restore Your Files? [-] Write Us To The E-Mail : [email protected] [-] Write Your Unique-ID In The Title Of Your Message. [+] Unique-ID : 942A0EF7 [-] You Have To Pay For Decryption In Bitcoins. [-] The Price Depends On How Fast You Write To Us. [-] After Payment We Will Send You The Decryption Tool That Will Decrypt All Your Files. _______________________________________________________ [+] Free Decryption As Guarantee [+] [-] Before Paying You Can Send Us Up To 5 Files For Free Decryption, The Total Size Of Files Must Bee Less Than 10MB, (Non Archived) And Files Should Not Contain Valuable Information (Databases, Backups, Large Excel -Sheets, Etc). _______________________________________________________ [+] How To Obtain Bitcoins [+] [-] The Easiest Way To Buy Bitcoins Is LocalBitcoins Site : https://localbitcoins.com/buy_bitcoins You Have To Register, Click 'Buy Bitcoins', And Select The Seller By Payment Method And Price. [-] Also You Can Find Other Places To Buy Bitcoins And Beginners Guide Here: http://coindesk.com/information/how-can-i-buy-bitcoins _______________________________________________________ [+] Attention! [+] [-] Do Not Rename Encrypted Files. [-] Do Not Try To Decrypt Your Data Using Third Party -Software, It May Cause Permanent Data Loss. [-] Decryption Of Your Files With The Help Of Third Parties May Cause Increased Price (They Add Their Fee To Our) Or You Can Become A Victim Of A Scam. _____________________CoronaCrypt_______________________
URLs

http://coindesk.com/information/how-can-i-buy-bitcoins

Extracted

Path

C:\Users\Admin\Desktop\info.hta

Ransom Note
All your files have been encrypted! All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [email protected] Write this ID in the title of your message 942A0EF7 You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files. Free decryption as guarantee Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 10Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) How to obtain Bitcoins The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe
    "C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\How_To_Restore_Your_Files.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:2664
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\How_To_Restore_Your_Files.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:2564
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\Desktop\info.hta
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2104
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\info.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:1740
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C timeout 2 && Del /Q /F C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\timeout.exe
        timeout 2
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:2692
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\How_To_Restore_Your_Files.txt

    Filesize

    1KB

    MD5

    c111bd7dadf4000cfe2996f4a5c31c4c

    SHA1

    61947a5acb689b52083f9ca7d475530577e86d35

    SHA256

    d8da6f284666219f04326488348c0fb38986263a4211852689ea20dc69ef636c

    SHA512

    9f018bcb204eee669a022f243e907034ec150aafdf62c86e54aa3ec19b195d66a4eb189ae9293360090f00b4fb0f56337c965c1ee4ffcd935273273aa9f146a7

  • C:\ProgramData\Microsoft\Assistance\Client\1.0\fr-FR\Help_MValidator.Lck.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    16B

    MD5

    f65d3bfa5ea21cf34b1b375bece5ad48

    SHA1

    7fa0aad2661664fb4ad0ab05ff42579729ae87da

    SHA256

    9367e6f4b5fe319b139efec40c66f9ba8b1c0dc75cabd0058fe90422cc828a6b

    SHA512

    e10a2823240dc00f89eb9341ae9661656396f4deb74a28a2fd41c8e3092cadf64f1edb270eb0ff510075b23557d0cbf902551d3a284f9c2a8e8a90dac32b2d80

  • C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    140KB

    MD5

    04dd87004cf81deb371b5a7256e7da5a

    SHA1

    68cc8b27126dc98d026b33fc049a7a35372cbfcd

    SHA256

    bef47833e42a81321704b8a1187f368af8fe456af374def489b49a3a760e85b2

    SHA512

    06f4206148a60e0408c716e1afd3a934996342cb5626bc5cf0457b7d0eedb5dabc27f9d9b120ed4864b96dd2d05d0999ba5c07b050712f8c897cabb9377df34a

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_2.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    8KB

    MD5

    5f4605d57649dfbabefe76ee9b0b9483

    SHA1

    7a475d1ba03717fc7a65bf3b08a4cbe9f3015f9f

    SHA256

    9bbe37db06fffd531506e15b3bae561e62d066c5f5ab0fb08026b09d0e8dc0f0

    SHA512

    6ea17ebaf9c332ed6f00f62a05fdc7b952065b3910141596781463890201f56e1a1407f43781f32cb1e636d1cbffb2cf63d79569cc54598eb51549f5aebc8daf

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    32B

    MD5

    6f04b271d510cf560a49347d52f7a0b9

    SHA1

    8029c2e3f15d37093b94a2eed3164c2d1c19cf30

    SHA256

    7a8645e12f08326ec8f56c246d015d107f08ced4957d3fde5c88aea4ff286022

    SHA512

    7cd6409ef7b9818a9c39396e31d03e9361bf41026e8c6b2ddfecd3352d3ee8968758af2f2439ac1d40779809c0bf9d07f5e8d6f858621131849186089f885a81

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UGUBWRQR\desktop.ini.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    80B

    MD5

    f0c759f5e4a742b2e95976bc7cf63688

    SHA1

    3a2497d0879a4e8bd92b1462326dc9b66fb0d71c

    SHA256

    c75b89de10e8d676febd9b6e2fb7e179cb10e307e50562847810cd8a338145eb

    SHA512

    50d8189ac36c4c70e7d24269ac036ae5aba184e2d991ff0b921d97f3f45f410935296ba5938219e15f6a878d77a11717993acdb74f3f26c6864870f5715d137c

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    28KB

    MD5

    772d9ccf38731ea7fa8e104e1766a19c

    SHA1

    cad18ca149a77f9e963157b13135fa6b72fd3158

    SHA256

    999157935b240680033cef91ad6709bcf7db6bcf05165b4bc44af953dc979265

    SHA512

    93eb00512eee86ee0fa52396691748c3368ad0a44d0fbb2c20ecca384b9b26711a15a3d98cc69963de26b196739679bbbafde220f747e38780bcf21d117dbba4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01res00001.jrs.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    512KB

    MD5

    893cd9f85e0acc574ba5fd4a8940e1fe

    SHA1

    abf03a61e0a5a05c90fa4c2fe18b64dbf068f5d6

    SHA256

    c06041ab4e005eb9f75ac740d1ad96e9dd60bf193a0c7621d764d46f154137b4

    SHA512

    5c15339c452e69cff2ef6dd5c6f86e40d36dd07f93e14a314688a16cb1e5f61f326032dac377fe89202963e5d297f2fa83ef4cca2089995d51b97d594a604f79

  • C:\Users\Admin\AppData\Local\Temp\6c3c9af653a28977257ce971ed701b1b893cdf67d5c57baa44a9d76c28675dc3.exe.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    21KB

    MD5

    8e9c41b68beff9dae5fb55e1c35b046d

    SHA1

    6a79f28bc0658121dc8de18a2fb5154190ffac3f

    SHA256

    79ebc716b33b5a9953ba6d3f7436a923cf4db2bbe0892f31d71f52d81e392214

    SHA512

    411b10f93d11495d7df54c7077e2a7e1d1f512c01c2be42b79d78c95bbd70232432b7b23b9d62b38af2f4d915477185c78f18960123ae8dc3e2632b43dffb7b1

  • C:\Users\Admin\AppData\Local\Temp\7bca70a81cc9e1067e99e313802a4cc095f79bbc3a1aa86b7b3b9eabf3748e61.exe.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    29KB

    MD5

    b5d9286149fdaf849daf0d25cda852d1

    SHA1

    566abe5b920161f35826a31d355576ab8cc2a501

    SHA256

    eb87a478ec0ce2ccbdbf89d1a90e8944deb76874abeb29133e3e0003d5471970

    SHA512

    24dea815028de190702d079504afc8973e49e304e58cb06f35bbb70e5ef5de5bb1386a0e009ada44e800a97e482bba1067177d5941a4a271da17c533c875a7aa

  • C:\Users\Admin\AppData\Local\Temp\KnoA46C.tmp.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    16B

    MD5

    fa7152b3abc872fdcd95aec66bfdfd79

    SHA1

    50cee66006aebd60af612c62f3f240ae18db45f2

    SHA256

    b7100ae2e96bbfacc91023e0663a228b4a199e87300b9d7597ad2602ab987c57

    SHA512

    d6bbb6eca3f1a3336010461bed51de2a077fae9c8c6786ec047664fa328bf6c4ad7ecd7a11a40eae3a567a66387121e9ee54cba4a01484dd0865171f9f864741

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted

    Filesize

    48KB

    MD5

    020ad4297233c62a2ff882b748fe6af5

    SHA1

    a5de7b3c32b75d3a1ef538b575f8731b34262204

    SHA256

    fc0ac366a17988d79050a01b50146788ebc5f48a275538a6bb085458c0d84ac8

    SHA512

    ef2aaa8d35c06e45fbdd7cb33c9cf31dad4b4ec64a7316f69474f81856b38f80222b0fb1443ac0fa10ff0ac3b66a505773f86b470ed9b692b3761e8f69f40eee

  • C:\Users\Admin\Desktop\info.hta

    Filesize

    5KB

    MD5

    94c69473c99c27709bcde6ec76f39560

    SHA1

    b2fc2c4d8e39ce939ebc39d0d6fde2d64c94c736

    SHA256

    0a200960923bc5b56e85652ceb446ca88c21192cd3acd75da0278d250d55dad0

    SHA512

    9afd4314afb864e7795da6dc4cbde2ed43c31c44e984ed94b4bb8323db485addd5e80401153176008ae7a818734b466c405972d1f89b29aed2d41bd86675f700

  • memory/2432-0-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

    Filesize

    4KB

  • memory/2432-65-0x0000000073ED0000-0x00000000745BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2432-64-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

    Filesize

    4KB

  • memory/2432-2-0x0000000073ED0000-0x00000000745BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2432-1-0x00000000013E0000-0x00000000013EC000-memory.dmp

    Filesize

    48KB

  • memory/2432-5672-0x0000000073ED0000-0x00000000745BE000-memory.dmp

    Filesize

    6.9MB