Analysis
-
max time kernel
114s -
max time network
133s -
platform
windows7_x64 -
resource
win7 -
submitted
12/08/2020, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe
-
Size
28KB
-
MD5
c3aa5efc9a1f5cba6f031b8a7be3584e
-
SHA1
6af4f9b81a3e80c910b85bdc22d53dfbc3d706e6
-
SHA256
665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93
-
SHA512
aeac12332a9d7de3eccd5b0b9753e243a595e89c147bbd5d931dba63a42aa700908aa5662ab167da5cef3da8ad46abc11a9623b25e68f8632de568c32fdb68b5
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SkipRemove.png => C:\Users\Admin\Pictures\SkipRemove.png.proced 665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1152 665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe"C:\Users\Admin\AppData\Local\Temp\665d7e656baecc8acccebf4b956719eb6c4099886f75008c8806efb945207e93.exe"1⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1152