Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/10/2024, 02:50

General

  • Target

    Nebula_Quest.exe

  • Size

    1.0MB

  • MD5

    055d1462f66a350d9886542d4d79bc2b

  • SHA1

    f1086d2f667d807dbb1aa362a7a809ea119f2565

  • SHA256

    dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0

  • SHA512

    2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

  • SSDEEP

    24576:FRYz/ERA0eMuWfHvgPw/83JI8CorP9qY0:FE/yADMuYvgP93JIc2

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
All your files have been encrypted! All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [email protected] Write this ID in the title of your message DF6BCF0D In case of no answer in 24 hours write us to theese e-mails: [email protected] You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files. Free decryption as guarantee Before paying you can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) How to obtain Bitcoins The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (439) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nebula_Quest.exe
    "C:\Users\Admin\AppData\Local\Temp\Nebula_Quest.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Windows\system32\mode.com
        mode con cp select=1251
        3⤵
          PID:11964
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:26024
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:25736
        • C:\Windows\system32\mode.com
          mode con cp select=1251
          3⤵
            PID:25988
          • C:\Windows\system32\vssadmin.exe
            vssadmin delete shadows /all /quiet
            3⤵
            • Interacts with shadow copies
            PID:25964
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
          2⤵
            PID:25856
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
            2⤵
              PID:25888
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe"
            1⤵
              PID:740
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
              1⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2672
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:25996
            • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
              1⤵
              • Drops file in Windows directory
              • Enumerates system info in registry
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:25584

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-DF6BCF0D.[[email protected]].ncov

              Filesize

              2.7MB

              MD5

              9c94e9bda743ca7d5399f50ad17e22b2

              SHA1

              023c1f73c14b491c01438d0d340af4d1dec53957

              SHA256

              156817c8a87c054e3dadbb3fe43de05b087ff1394d04040afb56e21a710e813e

              SHA512

              4aa87f6616857769437e34b77c5c54995bb93542e72f549bc014fe1f6fb269b1cce04e35ec44cac216561d18085260514775a2e611547c276fcd0a091dd7b74a

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\D1ASO0I0\microsoft.windows[1].xml

              Filesize

              97B

              MD5

              a848b3f6c81a7a028b2852b0e43bdaa7

              SHA1

              9e324eac693cecdf917536adf5c7832a31961f52

              SHA256

              50cc2f27cb60509261beb81bb6d4960807d33124be9cba3e301c075aabf0de0f

              SHA512

              cb4579277d934e1c26ead45d39c5f7a1079f8af0c025eb95ae9e2b213bdaade74740a81af01c015bb6bc84689fdabb34b8b6dab9c506c1781c066329b3567f7d

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hrw5b5gv.4y3.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

              Filesize

              13KB

              MD5

              10af97bc4f0f42dc691fdef18ca983b7

              SHA1

              f5da9610347feaf00bcca512e5904792d68bd1d2

              SHA256

              db054273dc7b79ad7ad79cd049ca463a62bc64870a909918abe74344ddff83c7

              SHA512

              287b49de7b921fb7bc62c051e282627b74c09e17a5010330df3862a485f8e3c2759f866de183bc262cd32c0c9af0588c7c07ae0d9510066a2d45773a95145d5c

            • memory/2024-7825-0x0000000000400000-0x000000000056F000-memory.dmp

              Filesize

              1.4MB

            • memory/2024-22184-0x000000000ABF0000-0x000000000AC24000-memory.dmp

              Filesize

              208KB

            • memory/2024-0-0x0000000000400000-0x000000000056F000-memory.dmp

              Filesize

              1.4MB

            • memory/2024-53-0x000000000ABF0000-0x000000000AC24000-memory.dmp

              Filesize

              208KB

            • memory/2024-55-0x0000000000400000-0x000000000056F000-memory.dmp

              Filesize

              1.4MB

            • memory/2672-21030-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmp

              Filesize

              9.9MB

            • memory/2672-11-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmp

              Filesize

              9.9MB

            • memory/2672-20551-0x00007FFBF4EC3000-0x00007FFBF4EC4000-memory.dmp

              Filesize

              4KB

            • memory/2672-36-0x00000178BD570000-0x00000178BD5AC000-memory.dmp

              Filesize

              240KB

            • memory/2672-8-0x00000178BD360000-0x00000178BD382000-memory.dmp

              Filesize

              136KB

            • memory/2672-48-0x00000178BDAC0000-0x00000178BDB36000-memory.dmp

              Filesize

              472KB

            • memory/2672-37-0x00007FFBF4EC0000-0x00007FFBF58AC000-memory.dmp

              Filesize

              9.9MB

            • memory/2672-7-0x00007FFBF4EC3000-0x00007FFBF4EC4000-memory.dmp

              Filesize

              4KB

            • memory/25584-22187-0x00000123E6730000-0x00000123E6830000-memory.dmp

              Filesize

              1024KB

            • memory/25584-22186-0x00000123E6730000-0x00000123E6830000-memory.dmp

              Filesize

              1024KB

            • memory/25584-22191-0x00000123E6F60000-0x00000123E6F80000-memory.dmp

              Filesize

              128KB

            • memory/25584-22217-0x00000123E70E0000-0x00000123E7100000-memory.dmp

              Filesize

              128KB