Resubmissions

22-11-2024 22:54

241122-2vh7gaxmfl 10

22-11-2024 03:27

241122-dzqkcatmht 10

22-11-2024 03:16

241122-dsgc4atlgs 10

Analysis

  • max time kernel
    288s
  • max time network
    299s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:16

General

  • Target

    AES-NI.exe

  • Size

    999KB

  • MD5

    83e824c998f321a9179efc5c2cd0a118

  • SHA1

    16b84004778505afbcc1032d1325c9bed8679b79

  • SHA256

    4142ff4667f5b9986888bdcb2a727db6a767f78fe1d5d4ae3346365a1d70eb76

  • SHA512

    d1c9fdb653d6b028c16a9d82895b7f03b6f96aecc802ab5104d6a762091e71502e407feea3d3d64f19b9f7c2888b1fb2b1dd5f2909b6e29414d4e4a78b56917b

  • SSDEEP

    24576:xMhc8sFdkS6BEeL8xYSCy3vIyzlueaBLxGLJe3:Ghc8sFB6WeIYSPAyUHxGLJe3

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\!!! READ THIS - IMPORTANT !!!.txt

Ransom Note
===============================# aes-ni ransomware #=============================== █████╗ ███████╗███████╗ ███╗ ██╗██╗ ██╔══██╗██╔════╝██╔════╝ ████╗ ██║██║ ███████║█████╗ ███████╗█████╗██╔██╗ ██║██║ ██╔══██║██╔══╝ ╚════██║╚════╝██║╚██╗██║██║ ██║ ██║███████╗███████║ ██║ ╚████║██║ ╚═╝ ╚═╝╚══════╝╚══════╝ ╚═╝ ╚═══╝╚═╝ SPECIAL VERSION: NSA EXPLOIT EDITION INTRO: If you are reading it, your server was attacked with NSA exploits. Make World Safe Again. SORRY! Your files are encrypted. File contents are encrypted with random key (AES-256 bit; ECB mode). Random key is encrypted with RSA public key (2048 bit). We STRONGLY RECOMMEND you NOT to use any "decryption tools". These tools can damage your data, making recover IMPOSSIBLE. Also we recommend you not to contact data recovery companies. They will just contact us, buy the key and sell it to you at a higher price. If you want to decrypt your files, you have to get RSA private key. In order to get private key, write here: [email protected] [email protected] [email protected] IMPORTANT: In some cases malware researchers can block our e-mails. If you did not receive any answer on e-mail in 48 hours, please do not panic and write to BitMsg (https://bitmsg.me) address: BM-2cVgoJS8HPMkjzgDMVNAGg5TG3bb1TcfhN or create topic on https://www.bleepingcomputer.com/ and we will find you there. If someone else offers you files restoring, ask him for test decryption. Only we can successfully decrypt your files; knowing this can protect you from fraud. You will receive instructions of what to do next. You MUST refer this ID in your message: UPNECVIU#9280BEBEDB0B889C212330DA0B6F9E4F Also you MUST send all ".key.aes_ni_0day" files from C:\ProgramData if there are any. ===============================# aes-ni ransomware #===============================
URLs

https://bitmsg.me

https://www.bleepingcomputer.com/

Signatures

  • Renames multiple (8186) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Drops desktop.ini file(s) 48 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 6 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AES-NI.exe
    "C:\Users\Admin\AppData\Local\Temp\AES-NI.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Deletes itself
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini

    Filesize

    948B

    MD5

    e0e5f3d1f2885d27fc2e3faef715d4af

    SHA1

    2fcf76a0890e476d5b86250e29902a7df287ae9b

    SHA256

    f6f5d083d4ab6e7c045f219464747425aa404a83e49b3d891dbda7e0e25ea55d

    SHA512

    b3ec6747b9a1d1ad38e425cfd61016c1a5ce9a3c7701f12580118ce9187fdd21537325d71d927ff323e282f5cb34a0e1c0099790e53bfbc54ca4923e660ef364

  • F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\!!! READ THIS - IMPORTANT !!!.txt

    Filesize

    2KB

    MD5

    28d3d958ece1db43d158c9af52af0116

    SHA1

    93e5f7b2e22728166a60c625c4e51e7cca5db4e5

    SHA256

    4bf611625fe120c7d7a91f07ef92aaa7fc792e9d6452d78ac2d42ea373aef1b1

    SHA512

    3cacd78feb8cab8b38e1a9b7a9ca2af7b5ec472a91c9123f58deb0f3f67a9980b355e08ceae341437a83d9087dc0bd2f4fd4022df6fd766fe336852f5092bb2c

  • memory/2856-38-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-19-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-40-0x0000000002F80000-0x0000000003143000-memory.dmp

    Filesize

    1.8MB

  • memory/2856-39-0x0000000002F80000-0x0000000003143000-memory.dmp

    Filesize

    1.8MB

  • memory/2856-48-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-49-0x0000000002F80000-0x0000000003143000-memory.dmp

    Filesize

    1.8MB

  • memory/2856-52-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-36-0x0000000002F80000-0x0000000003143000-memory.dmp

    Filesize

    1.8MB

  • memory/2856-61-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-35-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-20953-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-20955-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB

  • memory/2856-20954-0x0000000000670000-0x000000000076E000-memory.dmp

    Filesize

    1016KB