Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 02:06

General

  • Target

    066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe

  • Size

    871KB

  • MD5

    2d2c7ee748d941798466b19b53da88bb

  • SHA1

    7c0cf86f123f2896795add3ecc7bafc30fdc87bc

  • SHA256

    066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a

  • SHA512

    9f5a9b6ce25222219f6ef07ac85e5fdf834215dcac81006629b21667aeb4ef9a809e336a66ead9fdcde0af8f51fa7d459b4875bf4023d6cee1eb189eba341912

  • SSDEEP

    12288:CfT9qqQfsr85q5+OeO+OeNhBBhhBB2Lq/5/1G9ba6qCX0GuE3mczIedIHEXNuQ8k:CfT9q1fsr85hJCX0GuWIEXAihyh3LEk

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' folder if you don't get answer within 6 hours. Contact us email: [email protected] [email protected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

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe
    "C:\Users\Admin\AppData\Local\Temp\066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:956
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\JTiDYQ\JTiD\..\..\Windows\JTiD\JTiD\..\..\system32\JTiD\JTiD\..\..\wbem\JTiD\JTiDY\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4248
    • \??\c:\Windows\system32\wbem\wmic.exe
      c:\iWzXmH\iWzX\..\..\Windows\iWzX\iWzX\..\..\system32\iWzX\iWzX\..\..\wbem\iWzX\iWzXm\..\..\wmic.exe shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1316
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1984
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

    Filesize

    4KB

    MD5

    d28a5112cb27400e3537123e9f2001f8

    SHA1

    8fbcec0b5175b9414da0cf6fd571877ca4e4b433

    SHA256

    2bfd904f9ad4f34c99002aa05f03363e7b2d6f18149b4d220de8d034eab3ffbd

    SHA512

    2b2e8010f9c7fef6a721a1d27d1cc1b7c1985a53a52df8dc3b490c25da86b61479e15f412e4a4514e9b28c0e27c2417fc02fef35db1fffb9add0c8832d57d050