Analysis

  • max time kernel
    26s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    18-07-2020 14:12

General

  • Target

    7f05bf6fd7f5c5bfe0c201d73029439b228bc4d729306f7cea8077f03292fe63.exe

  • Size

    2.9MB

  • MD5

    fdc4436fa5700e2ff984d25dfcb19a72

  • SHA1

    d6503f42be986ef42fe20c39309111bad7602403

  • SHA256

    7f05bf6fd7f5c5bfe0c201d73029439b228bc4d729306f7cea8077f03292fe63

  • SHA512

    a21a29ae37488ceb331405c1f53fa8e795dc1744561fa57352c1dadbc82e01e0bdd2f3b5c03a1dcf3f0d7dfb71670cf0be88d702b8757c3b83ba592212d59cc1

Malware Config

Extracted

Path

C:\readme_readme_readme.txt

Family

tongda

Ransom Note
send 0.3 bitcoin to 12ZsBrX4UTsdjJbx84GcPFGEQaKMyYU29p screenchot and key send to langdiru1887@protonmail.com and mawienkiu@yandex.com key:QI53WswlGWXCcXpoy1tUrk6xV+8PrIrwz9HHffkjNMjIkcJ1eYoN97bdkM2qRhusV1rCOvlGIcllPUVpjzKxkOmMmTJHIfWUSqZNX3ZZJY884S+n5NdP92jTEHS6uGUDFYSCDAtqHH7UX+T8c5ur2JIu3X2BA5rwOjuHd6P0dlduSOZ3q/Hm6/4qJDRB33pD+OPfNJBkZTVhHkdTTnw4mTf6p9uaYgSqjR/LzrFtyXzA7x66QkM83SLmpe/p77S9MjBqdEwLaF/5iLlpgnc70cBdWQivnSLDOXRI/dQKC/MYuLn4FH2P2/YHTj+Rl7QmJq6E9mCNwDrovtXLAitf2A==
Emails

langdiru1887@protonmail.com

mawienkiu@yandex.com

Wallets

12ZsBrX4UTsdjJbx84GcPFGEQaKMyYU29p

Signatures

  • Drops file in Program Files directory 584 IoCs
  • Tongda 2000

    Ransomware targetting the Chinese office management software Tongda OA.

  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Kills process with taskkill 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f05bf6fd7f5c5bfe0c201d73029439b228bc4d729306f7cea8077f03292fe63.exe
    "C:\Users\Admin\AppData\Local\Temp\7f05bf6fd7f5c5bfe0c201d73029439b228bc4d729306f7cea8077f03292fe63.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "taskkill /f /im mysqld.exe & cd ../mysql5/bin/ & move /Y mysqld.exe mysqld.exe1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im mysqld.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Kills process with taskkill
        PID:1088
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "taskkill /f /im mysqld.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im mysqld.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Kills process with taskkill
        PID:1812

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-0-0x0000000000000000-mapping.dmp
  • memory/1088-1-0x0000000000000000-mapping.dmp
  • memory/1800-2-0x0000000000000000-mapping.dmp
  • memory/1812-3-0x0000000000000000-mapping.dmp