Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe
Resource
win10v2004-20240802-en
General
-
Target
a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe
-
Size
473KB
-
MD5
a169a146571b908a412ba8482adee8f1
-
SHA1
47cd550be7567b8ff091fff32cd0d7c3c0e4f7d2
-
SHA256
a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905
-
SHA512
03e7df0b082efedf5eeca67c9333fe3ad404a66ed33a13f5105cb0774f18351fff3f30860dedd3640e8e66123fdb5a430d33ddb2c92e5ef1d268fe806d6d3999
-
SSDEEP
1536:heTmjxb5QIul2hD/S8+5hFg2NRrlSYDLGRxHwEEaY4qr6leWvebuFD0MCu7sWZc:19b45hmjqGR2l/mlHaMwGkHJhqDLcCl
Malware Config
Extracted
C:\Users\Admin\Contacts\read_me_lkdtt.txt
http://x6gjpqs4jjvgpfvhghdz2dk7be34emyzluimticj5s5fexf4wa65ngad.onion/0c04b15081595448821e25e8dd07423d9927fa54cd56d8797ea4d1315a682692
Signatures
-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Renames multiple (175) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exedescription ioc Process File opened (read-only) \??\F: a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid Process Token: SeBackupPrivilege 3064 vssvc.exe Token: SeRestorePrivilege 3064 vssvc.exe Token: SeAuditPrivilege 3064 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe"C:\Users\Admin\AppData\Local\Temp\a022e86b2bb3ed6b4a8676be8b1688397b6e15c693e69c5093d8eb04396d2905.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3992
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5039d96e315e46c95b340887c1376d31a
SHA1e4c03b1f13710f9888bbd554ffef8ec2f5bc438e
SHA256e9f4ecd100413d581c14bed13ad22c9448035b0a04bacaafdf9a50edf5546c68
SHA512cbe6929c548fc8d5650b67bab0c6effcd1cf95e0f472db4628dedd1a3920ad5a985bfdfcc6a19975529e8e3dbbfa8d36ed41548fd999c119110a00e9695526da