Skip to content

Analyse 'Evil-Ransomware' Dump & Decrypt file

Notifications You must be signed in to change notification settings

PierreAdams/Evil

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Evil Ransomware

(Based on Forensic - DGSE Challenge https://challengecybersec.fr )

$ file dump.vmem  
dump.vmem: data

vmem extention is a Vmware dump, we can use Volatility tools to extract some information from file

first : determine profile :

$ volatility -f dump.vmem -h imageinfo   
          Suggested Profile(s) : Win7SP1x64
                      PAE type : No PAE
                           DTB : 0x187000L
                          KDBG : 0xf80002c4c0a0L
          Number of Processors : 1
     Image Type (Service Pack) : 1
                KPCR for CPU 0 : 0xfffff80002c4dd00L
             KUSER_SHARED_DATA : 0xfffff78000000000L
           Image date and time : 2020-10-05 11:17:37 UTC+0000
     Image local date and time : 2020-10-05 13:17:37 +0200

Second, inspect dump with the profile we find :
Inspect processus :

$ volatility -f dump.vmem --profile=Win7SP1x64 pstree

Inspect all tcp Connections/Sockets

$ volatility -f dump.vmem --profile=Win7SP1x64 netscan

Some example : Volatility Cheat Sheet

If we search command line in execution : we have interesting return

$ volatility -f dump.vmem --profile=Win7SP1x64 cmdline
..............
Command line : "C:\Users\user\AppData\Local\Drpbx\drpbx.exe" C:\Users\user\Documents\Firefox_installer.exe
Command line : "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Documents\informations_attaque.txt.evil
.............

If we search all file : .evil

$ volatility -f dump.vmem --profile=Win7SP1x64 filescan | grep evil
Volatility Foundation Volatility Framework 2.6.1
0x000000001715ed50     16      0 R--r-- \Device\HarddiskVolume1\Users\user\Documents\informations_attaque.txt.evil
0x000000003fa3ebc0      2      0 RW-r-- \Device\HarddiskVolume1\ProgramData\Microsoft\RAC\PublishedData\RacWmiDatabase.sdf.evil                              
0x000000003fac8d10     32      0 RW-r-- \Device\HarddiskVolume1\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_Firefox_installe_d514681bfc376345742b2157ace1e72c17fd991_cab_0938b7ba\appcompat.txt.evil                                                                                                        
0x000000003fad8620     16      0 RW-r-- \Device\HarddiskVolume1\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000002.db.evil            

After some research about ".evil" extention

we can find evil is French Ransomware based on jigsaw : with this text :

Que les choses soient bien claires, nous ne tolérons aucune entrave à notre plan Votre action de résistance est vaine et dénuée de sens Nous vous détruirons sans pitié, vous et vos idées révolutionnaires, Vous avez peut-être deviné notre plan, mais vous ne parviendrez pas à le transmettre à la coalition internationale, Vos preuves ont été chiffrées et sont désormais inaccessibles mouhahahaha, Vous pouvez toujours essayer de payer la rançon, vous ne retrouverez rien Envoyez EvilCoins ici:

if we extract screenshot on dump file

$ volatility -f dump.vmem --profile=Win7SP1x64 screenshot --dump-dir .
$ ristretto session_1.WinSta0.Default.png 

we can see :

Now it's time to analyse : "drpbx.exe" drpbx.exe and firefox.exe are often the source of this ransomware

$ volatility -f dump.vmem --profile=Win7SP1x64 pslist
.....................
0xfffffa8000e91b30 drpbx.exe              2304   2916      8      149      1      0 2020-10-05 11:17:01 UTC+0000                                 
......................
$ volatility -f dump.vmem --profile=Win7SP1x64 procdump -p 2304 --dump-dir .

we can use this website tools : VirusTotal

we see this programme is a malicious exec with a 36 score point
like jigsaw, Evil is write in .NET

there are several tools avalaible for decompile .NET program
i will use DotPeek on Windows :


Import exec file :

now we can see the source code of this executable:

with code source we can see the algorithm use : AES

in this case 2 things interest us :

  • Password Encryption
  • Initialization Vector we find this information in the source code:


$ echo "RXZpbERlZmF1bHRQYXNzIQ==" | base64 -d 
EvilDefaultPass!

Once we have password and IV we can now decrypt interesting file :

$ volatility -f dump.vmem --profile=Win7SP1x64 filescan | grep evil
  0x000000001715ed50     16      0 R--r-- \Device\HarddiskVolume1\Users\user\Documents\informations_attaque.txt.evil
$ volatility -f dump.vmem --profile=Win7SP1x64 dumpfiles -Q 0x000000001715ed50 -D .

for decrypt aes cbc with iv and keypass i use this website tools : CyberChef


About

Analyse 'Evil-Ransomware' Dump & Decrypt file

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published