Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
27/07/2020, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Resource
win10v200722
General
-
Target
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
-
Size
65KB
-
MD5
5ff20e2b723edb2d0fb27df4fc2c4468
-
SHA1
e53d4b589f5c5ef6afd23299550f70c69bc2fe1c
-
SHA256
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641
-
SHA512
cbcb5bda77351902d149608b4df5637347bcd06f26fba83147c4de42b52ae675e3a0761691c19cb0cadc5b03f32cd0810951ba23cf21ebe266f1ec724ffee996
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Signatures
-
Deletes itself 1 IoCs
pid Process 1076 cmd.exe -
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CloseRequest.tiff 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\CloseRequest.tiff => C:\Users\Admin\Pictures\CloseRequest.tiff.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\GroupInvoke.crw => C:\Users\Admin\Pictures\GroupInvoke.crw.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File opened for modification C:\Users\Admin\Pictures\InstallRegister.tiff 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\InstallRegister.tiff => C:\Users\Admin\Pictures\InstallRegister.tiff.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\SplitUnlock.tif => C:\Users\Admin\Pictures\SplitUnlock.tif.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1512 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 284 wrote to memory of 1076 284 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 25 PID 284 wrote to memory of 1076 284 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 25 PID 284 wrote to memory of 1076 284 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 25 PID 284 wrote to memory of 1076 284 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 25 PID 1076 wrote to memory of 1512 1076 cmd.exe 27 PID 1076 wrote to memory of 1512 1076 cmd.exe 27 PID 1076 wrote to memory of 1512 1076 cmd.exe 27 PID 1076 wrote to memory of 1512 1076 cmd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe"C:\Users\Admin\AppData\Local\Temp\08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe" /s /f /q2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:1512
-
-