Analysis

  • max time kernel
    136s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 17:30

General

  • Target

    ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe

  • Size

    52KB

  • MD5

    ba9210de03de945901f02792f7994871

  • SHA1

    20c4569cbb6f2650b02f6a5257faa8a8dfb298bd

  • SHA256

    ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d

  • SHA512

    277d26eea627b3da26664aaa4f72a7b79cd50311e45c59333563b4f58b76e6562cbaa1d55127c69d0830864721efa890fa824e1be381cca5e84bddc98f2b44d0

  • SSDEEP

    1536:EJJRZQJes5b0k5bbyu6hXOKJrkH6sNNW:oJRa4kLmNVOKJIasNE

Malware Config

Extracted

Path

C:\ProgramData\README_1299646.txt

Ransom Note
Hello! All your files have been encrypted... Your personal Id: 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 To decrypt your files, write to email: [email protected] or [email protected] In the letter, send your personal Id and 2 small encrypted files for trial decryption. If you dont get answer from [email protected] or [email protected] in 72 hours, you need to install tor browser, you can download it here: https://www.torproject.org/download/download.html.en After installation, open the tor browser to website: http://t5vj34iny72dpdu4.onion and follow the instructions. Do not try restore files without our help, this is useless, and can destroy you data permanetly. However, the files can be recovered even after the removal of our program and even after reinstalling the operating system. Download the decoding video here: https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi
URLs

http://t5vj34iny72dpdu4.onion

https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 25 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
    "C:\Users\Admin\AppData\Local\Temp\ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\delback.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3324
      • C:\Windows\system32\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3596
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1492
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:3456
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\system32\PING.EXE
        ping -n 1 -w 5000 10.10.254.254
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1164
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Package Cache\{2BB73336-4F69-4141-9797-E9BD6FE3980A}v64.8.8795\dotnet-host-8.0.2-win-x64.msi

          Filesize

          728KB

          MD5

          5ea2675a7a66af26c8f8c48d6ab90ad3

          SHA1

          b7212ec0d9354b3445b17339191ed2b58766e79f

          SHA256

          4854fb1b43ad33b231ed2fa5793f91cd10179312c82f7a5bfd1d3ae17ff90173

          SHA512

          763bb84c3b4f21fc3ceaa5560a3dbf9002b57d04b87bd5d4a80af1239adb6c9fcde1df7634a1275aa8743cc543ac00d97bb355a3223097061efeff0c2e562694

        • C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi

          Filesize

          140KB

          MD5

          5f60466174398d3938b3f39c1d4f7ad6

          SHA1

          cf44380e332a87d44e5f6f24e6c289a281fdb3bd

          SHA256

          fa464caece32ce41514106cce38e40b55d28a462ac1f928fe14575601c2f2d90

          SHA512

          bf85c198484917a78e117bcb050cc884610accf9ea9f44edb40066096f6e3fb628a6bb77a085faa84c3fb0cda805ade82fe1a52e5892cecebef9e97dfb2a85f0

        • C:\ProgramData\Package Cache\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}v64.8.8795\dotnet-runtime-8.0.2-win-x64.msi

          Filesize

          26.2MB

          MD5

          0167a47f7481a121b4f662f86175b3f8

          SHA1

          a6e54dd8d1b208ed54647dedaa6b4e209aba226f

          SHA256

          21f46429869cd89d1ae2c110b4583e76e7210e3f3b7566ac1c4028275322a26d

          SHA512

          510cdea71daa02b699b2f3d02575f3a6d95a9c6e54fd86253b39a05ee7772b42f10ead736374be5af8ceea70b88b5d2fed54c3ba59b9ecac545b71a7822a4ac6

        • C:\ProgramData\Package Cache\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}v64.8.8806\windowsdesktop-runtime-8.0.2-win-x64.msi

          Filesize

          28.9MB

          MD5

          413cefd58bf5cc8fa1308c5dc25153e9

          SHA1

          773205aa7ab14f61de0d7d6d711f51ca6ead127f

          SHA256

          ce37220837c7472a105e071a26db97a8689efbfde8b5026a0d0ac6050b5a3824

          SHA512

          921ccb6a592c18348b0ca7b030f90c2f1ba74fd90bc48f1132455860cf94e76087f90294ac3c983dba17633dbc64d66f50a5be7c4e6312ed58b9fcd829bfa8a5

        • C:\ProgramData\README_1299646.txt

          Filesize

          1KB

          MD5

          ecaf4a5a147fe35ffd331c40f73acd1f

          SHA1

          3badb64edb30d551608627280824ad841dd82a79

          SHA256

          be6203b6465cb0760588e8436c0078e16c5cc30adcf014e3d76b3410d12759a5

          SHA512

          b4bdbba64401b9e4019decae95ed57267f212dfafdb4190a07ddd7a2e7a98ff6deab3144fb9356c1891bb818db78f2a33524dafad1e6465e6d2d89c588715a6d

        • C:\Users\Admin\AppData\Local\Temp\update.bat

          Filesize

          167B

          MD5

          d1df9bb96b34b2b9cba30dc139a00ef8

          SHA1

          44e80d8b875f296f7087eadc0584276fb68fa323

          SHA256

          17bdd9c1355d56e607eae45138d64ed86ebb1369dfcdf4f7ef313124c2f098bc

          SHA512

          7029c53a5de207b495c512bbfc160ccb1d76fb0101ff5bef497cc0bfa570228b5d641e3fb34ee4d17585a19e4ce0b1337f7e14750c70a014d69c1d8afa4f7ec2

        • C:\Users\Admin\AppData\Roaming\delback.bat

          Filesize

          147B

          MD5

          2450c91afcc2d4cc3dea374820bed314

          SHA1

          dd1b61d0aa6d1769018c1d3144de9bb960a64d3c

          SHA256

          4f157084c6e48b547e698ed83ae9a853a4db4b7a115249db272e3eb93316f7df

          SHA512

          b0b21d16b7f35bfc5526ed07407ec85a221a7a036827b65dce0a449d02a31f3f6f5ce2fbf94f0af01ce4a248b27ccf5f287dd2746ee423766be8d366f78ccc91

        • C:\vcredist2010_x86.log.html

          Filesize

          81KB

          MD5

          cd4bda39a8d067665fb3bf6e9269de89

          SHA1

          a0d3d16e68b480dc8556b94b875ed5fa27f13329

          SHA256

          eed3ddc4a5f0677b0b6c4448edecf107b0d966e29352c18e638472839d8c8f33

          SHA512

          cd29b46cf9169efb0184b924371a8ac053e1e4b70c35532da9f651007b114bda80cd507cae8fddc0f60355382af472c9a2cedf797c08c8c04ea6b1d45b3fae44

        • memory/636-1-0x00000000006E0000-0x00000000006F4000-memory.dmp

          Filesize

          80KB

        • memory/636-4-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

          Filesize

          10.8MB

        • memory/636-3-0x00007FFB39E23000-0x00007FFB39E25000-memory.dmp

          Filesize

          8KB

        • memory/636-2-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

          Filesize

          10.8MB

        • memory/636-0-0x00007FFB39E23000-0x00007FFB39E25000-memory.dmp

          Filesize

          8KB

        • memory/636-808-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

          Filesize

          10.8MB