Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 20:12

General

  • Target

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe

  • Size

    881KB

  • MD5

    9049faba5517305c44bd5f28398fb6b9

  • SHA1

    036c6b32f3e7d7d689c9b4d482091eebcc669bfa

  • SHA256

    d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3

  • SHA512

    65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a

  • SSDEEP

    12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' foeder if you don't get answer within 6 hours. Contact us email :[email protected] -> [email protected] Attach this file in the email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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe
    "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2552
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\dJhERC\dJhE\..\..\Windows\dJhE\dJhE\..\..\system32\dJhE\dJhE\..\..\wbem\dJhE\dJhER\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1260
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\ZObEyj\ZObE\..\..\Windows\ZObE\ZObE\..\..\system32\ZObE\ZObE\..\..\wbem\ZObE\ZObEy\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3148
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4840
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    efd0aee26e0b13ea843c68c4115840d9

    SHA1

    0cd479b10eeaacc9aeba0a26796f85e27176efb1

    SHA256

    fa84a8d0bcb4715788d3f58f4df88ede03340a5dfa73fbc7e2b8884d0e90b3e9

    SHA512

    b56423f17b05209b31ea3543ed9b8929294fd644078d90dd32756acb9df3c57ab363b4ee3c9a201edd6c3ae870f16c53225ecc46cc682b230fc0a5aea8fc4d11