Analysis
-
max time kernel
143s -
max time network
56s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
27-07-2020 06:55
Static task
static1
Behavioral task
behavioral1
Sample
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Resource
win10v200722
General
-
Target
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
-
Size
65KB
-
MD5
5ff20e2b723edb2d0fb27df4fc2c4468
-
SHA1
e53d4b589f5c5ef6afd23299550f70c69bc2fe1c
-
SHA256
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641
-
SHA512
cbcb5bda77351902d149608b4df5637347bcd06f26fba83147c4de42b52ae675e3a0761691c19cb0cadc5b03f32cd0810951ba23cf21ebe266f1ec724ffee996
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.execmd.exedescription pid Process procid_target PID 3228 wrote to memory of 2696 3228 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 71 PID 3228 wrote to memory of 2696 3228 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 71 PID 3228 wrote to memory of 2696 3228 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe 71 PID 2696 wrote to memory of 4084 2696 cmd.exe 73 PID 2696 wrote to memory of 4084 2696 cmd.exe 73 PID 2696 wrote to memory of 4084 2696 cmd.exe 73 -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 4084 timeout.exe -
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exedescription ioc Process File renamed C:\Users\Admin\Pictures\InitializeSave.crw => C:\Users\Admin\Pictures\InitializeSave.crw.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File opened for modification C:\Users\Admin\Pictures\PingLimit.tiff 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\PingLimit.tiff => C:\Users\Admin\Pictures\PingLimit.tiff.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\UnpublishUnregister.tif => C:\Users\Admin\Pictures\UnpublishUnregister.tif.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\AssertClear.png => C:\Users\Admin\Pictures\AssertClear.png.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe File renamed C:\Users\Admin\Pictures\ConnectEnable.raw => C:\Users\Admin\Pictures\ConnectEnable.raw.NEFILIM 08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe"C:\Users\Admin\AppData\Local\Temp\08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
- Modifies extensions of user files
PID:3228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe" /s /f /q2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:4084
-
-