Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 02:06

General

  • Target

    066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe

  • Size

    871KB

  • MD5

    2d2c7ee748d941798466b19b53da88bb

  • SHA1

    7c0cf86f123f2896795add3ecc7bafc30fdc87bc

  • SHA256

    066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a

  • SHA512

    9f5a9b6ce25222219f6ef07ac85e5fdf834215dcac81006629b21667aeb4ef9a809e336a66ead9fdcde0af8f51fa7d459b4875bf4023d6cee1eb189eba341912

  • SSDEEP

    12288:CfT9qqQfsr85q5+OeO+OeNhBBhhBB2Lq/5/1G9ba6qCX0GuE3mczIedIHEXNuQ8k:CfT9q1fsr85hJCX0GuWIEXAihyh3LEk

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' folder if you don't get answer within 6 hours. Contact us email: [email protected] [email protected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

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe
    "C:\Users\Admin\AppData\Local\Temp\066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1832
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\YyiPCl\YyiP\..\..\Windows\YyiP\YyiP\..\..\system32\YyiP\YyiP\..\..\wbem\YyiP\YyiPC\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\OLdvtb\OLdv\..\..\Windows\OLdv\OLdv\..\..\system32\OLdv\OLdv\..\..\wbem\OLdv\OLdvt\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1508
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    f4dd0248df24a763afe9909afdfe6b23

    SHA1

    0ba5db7e1bf3ccdf4b6b77da210ca44873acd69b

    SHA256

    175d782997e2e61352a8aeb68af0a1a88b5bae6e514aeb223ac27d2d0be0f6e2

    SHA512

    cebf967aee4c43d1021fd3815c94fb1e6821f73cb761724d42c0c446adba37d357ddfb7f15465bfda06a193ee89e712291881e69e11f11f8eaee967a1a1529a1