Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 11:30

General

  • Target

    51B4EF5DC9D26B7A26E214CEE90598631E2EAA67.exe

  • Size

    257KB

  • MD5

    6e080aa085293bb9fbdcc9015337d309

  • SHA1

    51b4ef5dc9d26b7a26e214cee90598631e2eaa67

  • SHA256

    9b462800f1bef019d7ec00098682d3ea7fc60e6721555f616399228e4e3ad122

  • SHA512

    4e173fb5287c7ea8ff116099ec1a0599b37f743f8b798368319b5960af38e742124223dfd209457665b701e9efc6e76071fa2513322b232ac50ddad21fcebe77

  • SSDEEP

    6144:xy+als+0nIycigV5cbEo6dZbBODPIsjQ/UFsYW:xy+aCFnIycigVSbObBODTMUd

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RESTORE_FILES.txt

Ransom Note
All your documents, photos, databases and other important files have been encrypted with strongest encryption RSA-2048 key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main encryptor red window, examine it and follow the instructions. Otherwise, it seems that you or your antivirus deleted the encryptor program. Now you have the last chance to decrypt your files. Open http://3kxwjihmkgibht2s.wh47f2as19.com or http://34r6hq26q2h4jkzj.7hwr34n18.com , https://3kxwjihmkgibht2s.s5.tor-gateways.de/ in your browser. They are public gates to the secret server. Copy and paste the following Bitcoin address in the input form on server. Avoid missprints. 1KdTdDgxHMGJeFGL8xJRRj3HMi2PYBCycJ Follow the instructions on the server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://34r6hq26q2h4jkzj.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following Bitcoin address in the input form on server. Avoid missprints. 1KdTdDgxHMGJeFGL8xJRRj3HMi2PYBCycJ Follow the instructions on the server.
Wallets

1KdTdDgxHMGJeFGL8xJRRj3HMi2PYBCycJ

URLs

http://3kxwjihmkgibht2s.wh47f2as19.com

http://34r6hq26q2h4jkzj.7hwr34n18.com

https://3kxwjihmkgibht2s.s5.tor-gateways.de/

http://34r6hq26q2h4jkzj.onion/

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (379) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\51B4EF5DC9D26B7A26E214CEE90598631E2EAA67.exe
    "C:\Users\Admin\AppData\Local\Temp\51B4EF5DC9D26B7A26E214CEE90598631E2EAA67.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\51B4EF5DC9D26B7A26E214CEE90598631E2EAA67.exe
      C:\Users\Admin\AppData\Local\Temp\51B4EF5DC9D26B7A26E214CEE90598631E2EAA67.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Users\Admin\AppData\Roaming\stcnwbj.exe
        C:\Users\Admin\AppData\Roaming\stcnwbj.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Users\Admin\AppData\Roaming\stcnwbj.exe
          C:\Users\Admin\AppData\Roaming\stcnwbj.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Sets desktop wallpaper using registry
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
            5⤵
            • Interacts with shadow copies
            PID:3032
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\51B4EF~1.EXE >> NUL
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2880
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RESTORE_FILES.txt

    Filesize

    1KB

    MD5

    ebbe83d3e23ed134c0e1f21066efeb4a

    SHA1

    c130f642a06bf66553c20f165ac6e5b6c4884a57

    SHA256

    53b764c9f9275181193d9d167ec4f649a75602b80a01f6e81066af93bfc8f738

    SHA512

    7d4a021bdcf4a50d66ba426092ecfd2fc24e7dd34c8e3f160c20d7a2380cab912451965122b451d835679abd34960a7769f9c2155d9a79d51cc7f08e170ab2a1

  • \Users\Admin\AppData\Roaming\stcnwbj.exe

    Filesize

    257KB

    MD5

    6e080aa085293bb9fbdcc9015337d309

    SHA1

    51b4ef5dc9d26b7a26e214cee90598631e2eaa67

    SHA256

    9b462800f1bef019d7ec00098682d3ea7fc60e6721555f616399228e4e3ad122

    SHA512

    4e173fb5287c7ea8ff116099ec1a0599b37f743f8b798368319b5960af38e742124223dfd209457665b701e9efc6e76071fa2513322b232ac50ddad21fcebe77

  • memory/1740-12-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2116-35-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2828-15-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-0-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-11-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2828-8-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-6-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-14-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-39-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-2-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2828-4-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-43-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-45-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-41-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-59-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-458-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-2239-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2840-2246-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB