Analysis

  • max time kernel
    143s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    03-09-2020 19:08

General

  • Target

    Ranesomware_protected.bin.exe

  • Size

    2.0MB

  • MD5

    dc7018f6363337ca3f0bd43894ce6aa0

  • SHA1

    72a3073a260bc768ffa1c22b447e0ba4a10a1f10

  • SHA256

    70733389c89b4358f04575226a8ce60c4511018c98731a2ff7f556c29447e4a4

  • SHA512

    50c8b2bbcea81f231ba8e6ae03360e7ee6555fc94ea27dbbeece74b4d516d030b7c37d05b9338910d558397707dab502bccb13bc4a538fc8a254576c69f33c07

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ranesomware_protected.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Ranesomware_protected.bin.exe"
    1⤵
    • Modifies extensions of user files
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2728
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:3888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2728-0-0x0000000002FF0000-0x0000000002FF1000-memory.dmp
    Filesize

    4KB

  • memory/2728-1-0x00000000030F0000-0x00000000030F1000-memory.dmp
    Filesize

    4KB