Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 20:12

General

  • Target

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe

  • Size

    881KB

  • MD5

    9049faba5517305c44bd5f28398fb6b9

  • SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

  • SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

  • SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • SSDEEP

    12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe
    "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2532
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\tkXgHG\tkXg\..\..\Windows\tkXg\tkXg\..\..\system32\tkXg\tkXg\..\..\wbem\tkXg\tkXgH\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\toaCvw\toaC\..\..\Windows\toaC\toaC\..\..\system32\toaC\toaC\..\..\wbem\toaC\toaCv\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:704
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1448
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    3611e9facb54cedaea73a5dfc72d31ed

    SHA1

    cdeb53ca4d5ddd892420d99c98fa2c531614594a

    SHA256

    f5e738f0638a3939ad24440230fbfe36a6d11924aa6e692b0705b641426b96e4

    SHA512

    6e924936f0ef44a6d3df3337c93c203e92123486d55a014e9ad010f420aa86fdc6f5d3b73242d1fdb0fe4676f140f50cbae162ad284125e6e52a958a911d6361