Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 09:05

General

  • Target

    2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e.exe

  • Size

    147KB

  • MD5

    e3e89421797130de9f4edebdd1980522

  • SHA1

    f3fad656375518254c520e5dc7d94a495443db7e

  • SHA256

    2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e

  • SHA512

    94d3670b2e2af3c18d4f441340973045bb9b658f401cf20e27b7376fdb4c37e7e8d2d39fa2f417536987957a5af7f81c44f433fa3cd392c288d852b427af38ec

  • SSDEEP

    3072:h6glyuxE4GsUPnliByocWepKooaLxQ3Rmz:h6gDBGpvEByocWeD8Rm

Malware Config

Extracted

Path

C:\blADqpmVf.README.txt

Ransom Note
>>>> Your data are stolen and encrypted if you do not pay the ransom The Your data permanently deleted >>>>What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and your data will not be disclosed . Life is too short to be sad. Be not sad, money, it is only paper. You can contact us and use your personal decryption ID to decrypt a file for free >>>>Your personal DECRYPTION ID: 79F912B255565ED7B94CCBC85D2D95F7 If we do not give you decrypters after payment, then nobody will pay us in the future. Therefore, our reputation is very important to us. You can contact me by email. Email:[email protected] Sometimes you will need to wait for our answer because we attack many companies. we will provide you the programs >>>>payment is completed, send the payment photo to Email: [email protected] >>>>payment is completed Send via email we will provide you the programs and you will restore all the data. >>>>Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
Emails

Signatures

  • Renames multiple (358) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e.exe
    "C:\Users\Admin\AppData\Local\Temp\2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\ProgramData\9FF7.tmp
      "C:\ProgramData\9FF7.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\9FF7.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1856
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x14c
    1⤵
      PID:2272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\BBBBBBBBBBB

      Filesize

      129B

      MD5

      ff528f3482bf9389c8571e499bf62e8f

      SHA1

      405fbf5638d6592f0b9f431a9f9740bd3d79a7d0

      SHA256

      f12eb7ee1e4e9dd8cd9e33b7b2eae8e92c6b185729f0200930f8ca34ea1b6fe4

      SHA512

      3739cade91e3b26686b1b4810850f3a444322ee1854f587253003d5816861f49e6594743efb5edfeaf0c31d85c091f96aa3214b24ee1929be4cba5db3352e3e9

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      147KB

      MD5

      1667b2177b1806b621f64d2db6fe3040

      SHA1

      7945dde59b90d13286184c2a380fc8de9c923eb7

      SHA256

      e8dbc53372b916a30c4ca80d9431c0f82597e396f1ea5bb4e46d81d464a5d7e8

      SHA512

      fcced7b43e65ffb08bc52640f8a5dfe13d1acdfeb787bdfea097808615c20bf5fd29f361cc16755ac0d36991b967bc80b1c8e9f331b605c309fde538da3e4de4

    • C:\blADqpmVf.README.txt

      Filesize

      1KB

      MD5

      408ec48ee6917b6eb2b2c836e58b9e2d

      SHA1

      6d7e79e8e6b0c28bbdf92fb64edc18e07bb492a8

      SHA256

      1016d2bb946e147f82a5898070bdf354bcf3d25c4835bcf241ddcf69e7d5a6d9

      SHA512

      c76ff81a218f56f07cacff3d515d13b66ce083e1a080669066c8b4623f7c925d206ede56a5236deb84c4a2b35b0b2a6831605b1136bb86e21436f0c23ddc6342

    • F:\$RECYCLE.BIN\S-1-5-21-3551809350-4263495960-1443967649-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      bc41d60cd0e23d2a40736de366c5c6ee

      SHA1

      29b4f60217a0a10a2915c6e1ffded5c1e473cd7e

      SHA256

      479474f1c3704ed8470701642b7cb30a91cdf0ac8dcd63e55fa318dc3acbeaaa

      SHA512

      44748ed7707e4bcd21873df9ca75d2831d88b02e59513a12d2b6d54f061f9dc4e7eb315811bb38c3a5200db683389225f4bb7a0695b72222b14407a7ed5b654b

    • \ProgramData\9FF7.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/2292-0-0x00000000002C0000-0x0000000000300000-memory.dmp

      Filesize

      256KB

    • memory/2336-894-0x000000007EF20000-0x000000007EF21000-memory.dmp

      Filesize

      4KB

    • memory/2336-892-0x00000000022A0000-0x00000000022E0000-memory.dmp

      Filesize

      256KB

    • memory/2336-891-0x00000000022A0000-0x00000000022E0000-memory.dmp

      Filesize

      256KB

    • memory/2336-890-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

      Filesize

      4KB

    • memory/2336-893-0x000000007EF80000-0x000000007EF81000-memory.dmp

      Filesize

      4KB

    • memory/2336-923-0x000000007EF40000-0x000000007EF41000-memory.dmp

      Filesize

      4KB

    • memory/2336-924-0x000000007EF60000-0x000000007EF61000-memory.dmp

      Filesize

      4KB