Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
General
-
Target
sample.exe
-
Size
280KB
-
MD5
badc00888b75a7a568d5a2b3d0cb6451
-
SHA1
10e2dde399f369bab14eba5acfa06a923394aa33
-
SHA256
994539855377a216b90c1db4f77fdd60dd89aa2296a19345cf19d9591419809e
-
SHA512
5d00ce31011d460a34446469382b4151d0a241853b925b979da4b758336ff3416ef93b77c31666d1b846fc0ab1e242b34c400ef5b8c2f33cc725d1c39d3d4c7f
-
SSDEEP
6144:EjWkd35a63FC6EkbwO+ZfhluCm9At1sotV50DErPtld:EjWk130CbwOouCmouDel
Malware Config
Extracted
C:\$Recycle.Bin\READ_ME_NOTE.txt
https://t.me/returnbackcyberfearcom
Signatures
-
Renames multiple (179) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation sample.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sample.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exeĀ" sample.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\READ_ME_NOTE.txt sample.exe File created C:\Program Files (x86)\READ_ME_NOTE.txt sample.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\READ_ME_NOTE.txt sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2596 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4528 2904 sample.exe 83 PID 2904 wrote to memory of 4528 2904 sample.exe 83 PID 2904 wrote to memory of 4528 2904 sample.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe" p r i v e t2⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\READ_ME_NOTE.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635B
MD542bba4a0949ea0f73a193f4aa130d777
SHA1c74d96dc21ecbc76822d9eabdd9b7bc6feca69d6
SHA2565364b0c5ea458ab438bd1d9fbfc76a5f6583d913f67344314c30dc8ab3c55b4c
SHA512b909a7ce7b79bcab319758425f8b83a485fafc874c26e2a73d84ea735df2ade868d83b5b53574e857170f48e02df051ddae26c78c05ee5a0ced2196d92f4276c