Resubmissions

25/09/2024, 14:01

240925-rb2vcsygnl 10

25/09/2024, 10:29

240925-mh8t2azgnl 10

Analysis

  • max time kernel
    15s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 14:01

General

  • Target

    GJecwa34.cpl.exe

  • Size

    873KB

  • MD5

    5b2ac6ed9b0830ec7f1c9eb7deb38c66

  • SHA1

    0f1011748dfff6a0d0f0c0b9b8bc045da54080a6

  • SHA256

    92ac711db16da541e06c5195050f6fbd8915255c79ded58f70ba030d37135ceb

  • SHA512

    d1509fbdf410c943b2df1f05f1ece680dbd45b6090b43985707f6ebccf940cf4d384a235838d75df8f72b688c41fbfc0ef41347dee869de2d7e3dd5aa1da68f8

  • SSDEEP

    24576:QLVxajaoPDR60nXKJxrYUrG/fNfhgsqYREh3TR:Q/b3MNJgsqYRed

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe
    "C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2108
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\wzboIP\wzbo\..\..\Windows\wzbo\wzbo\..\..\system32\wzbo\wzbo\..\..\wbem\wzbo\wzboI\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1544
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\SuPoiI\SuPo\..\..\Windows\SuPo\SuPo\..\..\system32\SuPo\SuPo\..\..\wbem\SuPo\SuPoi\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1940
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1708
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

      Filesize

      4KB

      MD5

      4764c8c335b9603e27754b1c868c0cf4

      SHA1

      95a0c23389f39cd2bdfb816f7626438499e44a2f

      SHA256

      9e51103e94a48bffd2e2dced5f857222a0945b1ce183c4f390798134cdddaa58

      SHA512

      ceed31216d65b884e56ad65eb4641013adea76addd7d887944c5227e6615b38e5797ac5cb182b8c58b767771e56c00a89859da9ffebab02032bffc5c77f0dad6