Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/12/2024, 15:27

General

  • Target

    Gosjeufon.cpl.exe

  • Size

    881KB

  • MD5

    9049faba5517305c44bd5f28398fb6b9

  • SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

  • SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

  • SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • SSDEEP

    12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe
    "C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3580
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\rtcUYC\rtcU\..\..\Windows\rtcU\rtcU\..\..\system32\rtcU\rtcU\..\..\wbem\rtcU\rtcUY\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:660
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\iBeIwH\iBeI\..\..\Windows\iBeI\iBeI\..\..\system32\iBeI\iBeI\..\..\wbem\iBeI\iBeIw\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:364
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3492
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4552
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Decryptfiles.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:3596
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:952
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1508
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    954e67e4ea50724f251531189b241777

    SHA1

    e5152c4858d2864bcb2f648955abc7667a8eb700

    SHA256

    1e525e366a516bac4261ca642569d1a8c19300f7ba39b8339f5769c66a8bb053

    SHA512

    21cfb403afa77661c829a22603b1c7e09229884ad957cb40a00c45440f4aa29181f0bfe4102b6410768a1a86af0a1d7674854e20f36af1ee36608245f7b306a4