Analysis
-
max time kernel
143s -
max time network
110s -
platform
windows10_x64 -
resource
win10 -
submitted
03/09/2020, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
Ranesomware_protected.bin.exe
Resource
win7v200722
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Ranesomware_protected.bin.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Ranesomware_protected.bin.exe
-
Size
2.0MB
-
MD5
dc7018f6363337ca3f0bd43894ce6aa0
-
SHA1
72a3073a260bc768ffa1c22b447e0ba4a10a1f10
-
SHA256
70733389c89b4358f04575226a8ce60c4511018c98731a2ff7f556c29447e4a4
-
SHA512
50c8b2bbcea81f231ba8e6ae03360e7ee6555fc94ea27dbbeece74b4d516d030b7c37d05b9338910d558397707dab502bccb13bc4a538fc8a254576c69f33c07
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SuspendUnprotect.png => C:\Users\Admin\Pictures\SuspendUnprotect.png.aes Ranesomware_protected.bin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe 2728 Ranesomware_protected.bin.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 747b181d2582d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3888 svchost.exe Token: SeCreatePagefilePrivilege 3888 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 Ranesomware_protected.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ranesomware_protected.bin.exe"C:\Users\Admin\AppData\Local\Temp\Ranesomware_protected.bin.exe"1⤵
- Modifies extensions of user files
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3888