Ransomware Tflower
Tactical report of ransomware Tflower
Identification
Vendor
|
Detection
|
McAfee
|
Ransom-TFlower.a
|
TrendMicro
|
Ransom-TFlower.a
|
ALYac
|
Trojan.Ransom.TFlower
|
Summary
Tflower is
categorized as ransomawre . It didn’t change the extensions of encrypted file
but it creates a ransom message included in file called “!_Notice_!.txt” which describes the instructions about
how to pay and get decryption tool to decrypt encrypted files.
The
following table contains a list of artifacts that had been analyzed within this
document.
PE timestamp
|
MD5
|
Size in bytes
|
File name
|
Description
|
2019/8/25 Sat 00:13:47 UTC
|
0643324FA7F74A3C5288CDE9D26C19A8
|
2.15 MB (2,255,360 bytes)
|
chilli.exe
|
Main functionality + encryption
|
Packing
The ransomware
Tflower protected with strong commercial packing called Themida as shown in figure (1).
Figure (1) |
Let’s see
how we can get important information from this sample.
UnPacking
It checks
for blue screen error, “iceext.sys”, “ntice.sys”, “Syser.sys”
“HanOlly.sys”, “extrem.sys”
“FRDTSC.sys”,” fengyue.sys”
as shown in figure (2), (3), (4), (5),(6),(7).
Figure (2) |
Figure (3) |
Figure (4) |
Figure (5) |
Figure (6) |
Figure (7) |
The reason
of these checks is ransomware need to unpack itself by debugger.
Anti-
dynamic analysis
It checks
for specific tools like “FileMonitor.sys “ , “ REGMON“ , “regsys”,”
sysregm” à sandbox ,”PROCMON ”, “Kernel Detective “
, “FileMonitoring.sys“ if one of them detected so ransoware will
terminate as shown in figures (8),(9),(10),(11),(12),(13),(14).
Figure (8) |
Figure (9) |
Figure (10) |
If it detects
one of the monitoring tools then it shows the error as shown in figure (15).
Figure (15) |
So after bypassing and skipped many of code you will reach to correct
execution after” retn 0xc “as shown in figures
(16), (17) then just analysis this and you will see code as shown in figure (18).
Figure (16) |
Figure (17)
Ransomware
behavioral
It clears shadow volume copies using this command as shown in figure
(19).
|
It disables
windows 10 repair environment using these commands as shown in figure (19).
- "bcdedit.exe /set {default} recoveryenabled no “.
- "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures “.
- "bcdedit.exe /set {current} recoveryenabled no".
- "bcdedit.exe /set {current} bootstatuspolicy ignoreallfailures".
Figure (19) |
Command and control server
It creates thread as shown in figure to connect to attacker as shown in
figure (20).
Figure (20) |
It gets computer name and set state where state can be null
or start to start encryption of files inside computer as shown in figure (21),
(22), and (23).
Figure (21) |
Domain name
|
https://www.adamaitalycup.it/wp-includes/wp-merge.php
|
Computer
name
|
WIN-RA9U596OBGJ
|
State
|
start
|
Figure (22) |
Figure (23) |
Persistence
It sets registry value
called “proxycap” to make sure that ransomware
will auto start encrypting files as shown in figure (24) and table.
Registry
path
|
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
|
Value name
|
proxycap
|
Value data
|
C:\Users\Mahmoud_El_Menshawy\Desktop\sample.exe
|
Figure (24) |
Target files and Encryption
It generates random key using RSA algorithm, starts encrypting them but
it neglect windows folder and sample music as shown in figure (24).
Figure (24) |
It searches for process outlook.exe and
terminate it as shown in figure (25).
Figure (25) |
It encrypts files and adds string “*tflower” to mark
this file is encrypted or not as shown in figure (26).
Figure (26) |
Tflower note
It creates file called “!_Notice_! “ When encrypt target files as shown in
figure (28).
Figure (28) |
First Email
address
|
flower.harris@protonmail.com
|
Second
email address
|
flower.harris@tutanota.com
|
After that it connects to attack website and sent information about
success of encrypted file and retried as shown in figure (29),(30).
Figure (29) |
Figure (30) |
If you wanna learn malware analysis you can check my YouTube channel I'm trying publish analysis of malware and some methods to analysis malwares.
Please don't forgot subscribe my channel Than you ♥
YouTube channel
https://www.youtube.com/channel/UCParXHaBXBmqRdHuVUg21pA
Malware analyst : Mahmoud El Menshawy.
Contact Me : mahmoudmorsy372@gmail.com.
Contact Me : mahmoudmorsy372@gmail.com.
linkedin profile : https://www.linkedin.com/in/mahmoudmorsy1/
Comments
Post a Comment