Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/12/2024, 04:02

General

  • Target

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe

  • Size

    881KB

  • MD5

    9049faba5517305c44bd5f28398fb6b9

  • SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

  • SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

  • SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • SSDEEP

    12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email. ID :9ACB682FAC04AD56018D4D79D4E1E64E2BFCF9E0EA1ECB1B4596B5EFD97E8A55B86BA855FF8BD60D6830BA62BE7ED142BD4C21428E3252A9495F70E24DED125848EDB882DFAFCEEDF9AF74680BA96EECBC09935FB273106D752959C63112F82A87AEC02A682F471A511294C555B9C5458DC2608AF55D1E2C44444AA89BAE78831B616E1887706B96688711D71D3091A8FB2811C2D06804DBD3AD5A757FCA82E5AA96ECC40E9A587915AEB5DABF1F3EAEBF53B6F17CC061C512B8F4B6D566A0509D1BA006740121B7A36A49DEC280D97A6CB2E3F04F80932B932E4E112D70501193FEFDFA85D97BBF64195FA7C7655DD798B5E6706C568B1C0B8B717340BE21D361D9418C817316BF094F51A0C06A00910A8CB646FFCB3F58F1193CABFCA66065AA913F3992651CE435C16E660A919DD24171247673AA2462F9531AE8BEC7C151AB379DFD51E6E605E295AE21DC74F1B299FBB6BC5862FDCC4EE56FB9510CEDE44DFCC7D5630DE189783D2EFCF0D9A5369C09AB572435843D706F6CF8B6B5BA83F307A309489FD7C6A4EEEB0D779C5B56070C26325936EE589949B78EC94BDE7D051D3D3046B213398C6E829B7969B3A4534FB6665AF6ED940D1BB43CFB728CBA32BE9945E3C82E2FAEDD8CCFF056A73D6E6301D1B14FFBBEFA5D7394724B8B271C10BBDF2AF505E95850276AFB26D9F005D7DF2216CC8332E27F9231E281407AB02037EF4AF617319D40A95A363F5DDD91F194A7A1E9C036A5D631C13F44D436D16F5835A3B29F4FE7486631D4CE3DBC9CD11E2965837B4E0D219B371958253659AB4A8DCA9A2470DB7593B803D14959FC399856A9D89C79C482C7558F39692B25F4CBCDA0780ED02AC00B3337A3EC9B1F8FB47F92F593407344316D6ECD4AEB7A46E49561EDFF826E0385C0C4D60F301ED153D65A2CB681E6CF19AB4543D0E0668E9600D09C2C8DF7AA8C7EA4F0FEF9D4C6FBC82A7B97930596CC554A3CA5CF03051EE3C566E355F3B40533FC9E900FDFA2634C2F201E163B265B155343C8EC5FA4EEF8853C1DF1B89497BBC01771D822498A32AB7D22D9D2471783A526581F555546B5C41D92168B021489CB3A6A62C964487DF31FD7463C6FB1E466898B842623DEA8945FF72F98C3FFFB3DCCD528E1FE12CFB9290FCA2A34A8932155CCD370995A6B80BE5388B7397791CBBAB36A302D031441A7BB3B4E540EA37F9EEDB084E749A761AC06A59B8276675E1C3DAE52A54834D57E1FE7050F572F140616DBD57D16EB41803DC4A9CDB76A03D45CC48769EE22394385BD71B1A4B8281F00088CB1D8B2F904A43643AC45D48EBEA8AEABB6410C81C23D821E934A9CB7ABF9E228FCB0E32C7CE743EE7CB05F2124E49AF55442AAF25FD1ED39E3C1D6F3BD0BCC59CD829CAD50C7505313A9D5559E96FDAEC9DEAD42C80C74EF30E99B9B066269439D47D4DC2A2D1E654D6327F376135E825CB4F39BC11F7DB1897153B64629495862FE9E6081CEE1D10D037312409F5F23A4F93A99A5E847D30598C41950A7E5A5ABAC9B0F2D9DAAFA2EDA5AC7637B2E2AFD09257B4657094320E34FAA3579A9132CAB84AE44C25D844DCCB06C3F9BDBA986AC875D1FCE5145E43B36EF0EBD8B9F4EC36B3CEC6F5772B00653A3D94BA6BA04C58BD813396220EC7D16CC9DBCE27820BB098E425917C32255AE9EB3F08EC254AB26EE9D50DDDEFFFFAAEA032C8F908E85607A341926BA41A7D44BF4E989242BC3A1C01D80686EB1BC7EFD150329F3A43F92030F557BF8D89F5FC23148F7D9C55CD7F10E0883EC872D8DCEF488015255AB98AB4E53DE02D836C2CD212F94BA863FA67FEE54EF7EAA0746211F9A9A239451B4522941984D30BA04EABB122C751BA0BE9A53AD293724AD972A5AC8E6DB46E65D83DC1D23E607CFE427EA58C501028784D508C002C8B699F737B6AB10691D876826D8CDAA352BE0AEAAF07F89D29211FA0C2152668AA35580F351DA5D325635C76FF1F6EB38FE9A98C9C97F4C6CC23B11063F99D031F1C530656BC22DB371E60BFF375D2D0A2FD15E9D1525AD0624EE113260449FBEF099E262E33871B541201CE64658897320D8E963EF925AE98A1A22815FFE5C8F3777626565A0D1999A6A35B5B25AC327015F54049F95202E3F3EEE165C2F14667BC94CD755B39F534CCBF36923CD31A0428C1FAB4EE189239BF892EBC218AB6E4C514CCE478A94C129FE5D40CF7E3F2CDB12AC22D973E4017CEBC29C3CBF8011BB51CCD3CDE9F4B98EE013741F215F874E1B1FD41CDCD73E4065962EB2A4D61F6BA078D41D6FDFC4A758247CF253E536988E6835D3E98BB86E44FD5B95972EF254E9C50D9405FF2C38340647F99D721BE033

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe
    "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3672
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\miQALX\miQA\..\..\Windows\miQA\miQA\..\..\system32\miQA\miQA\..\..\wbem\miQA\miQAL\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:856
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\DvhujF\Dvhu\..\..\Windows\Dvhu\Dvhu\..\..\system32\Dvhu\Dvhu\..\..\wbem\Dvhu\Dvhuj\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4728
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3564
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    307960c2469f75abed430102ea24ce58

    SHA1

    4004b7a0da1f5ee204b2645cdf1d8e5bdd68f0dc

    SHA256

    0f5f1fba6a282dc087d2a02344dcff14220261cfffead1aadb12418b6b0b74e0

    SHA512

    97444598857555a7f18d60f2f20930c82663354bd07eda22c710d295dd3d31598d605985abd6c7eaf9215beaf21d42ae15daf65cb4802ce5595b25876794a2bb