Analysis

  • max time kernel
    145s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    11-06-2020 11:24

General

  • Target

    ransomware.exe

  • Size

    259KB

  • MD5

    61e7fef300b01614836c82051d840615

  • SHA1

    df05c78a8b88ecd1b8e2db6dcc42f027065db6ac

  • SHA256

    99f3f126c0da424357b510e2b1bb7b80b0a83e77802e9eeaec5119cb26b13231

  • SHA512

    29e890068caca97e3f09eed17f9c02e367bf1c4e1d5fdc77b373e6d91223fd61355057e2ab36e6615de0c3cd62ef523a7accd214a44a1e7b5083fdefcde02185

Score
10/10

Malware Config

Extracted

Path

C:\Program Files\Java\jre7\bin\!!_FILES_ENCRYPTED_.txt

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups, replications were either encrypted or wiped. Shadow copies also removed. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME OR MOVE the encrypted and readme files. DO NOT DELETE *.ESCAL-p9yqoly files. This may lead to the impossibility of recovery of the certain files. To get info how to decrypt your files, contact us at: imperial755@protonmail.com imperial@mailfence.com To confirm our honest intentions we will decrypt few files for free. Send 2 different files with extension *.ESCAL-p9yqoly. Files should not contain essential information. Files should be inside ZIP archive and mailed to us (SUBJ : your domain or network name). It can be from different computers on your network to be sure we decrypts everything. The procedure to decrypt the rest is simple: After payment we will send you decryption software. Don't waste time, send email with files attached as soon as possible. if you contact the police, they completely BLOCK any activity (mainly financial) of the company until the end of the proceedings on their part. It's just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. It's not in our interests. If you will not cooperate with our service - for us, it's doesn't matter. But you will lose your time and data, cause just we have the private key. �
Emails

imperial755@protonmail.com

imperial@mailfence.com

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Drops file in Program Files directory 7440 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\ransomware.exe"
    1⤵
    • Drops file in Program Files directory
    PID:288
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1764
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\!!_FILES_ENCRYPTED_.txt
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads