Analysis
-
max time kernel
30s -
max time network
113s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
13-09-2020 07:17
Static task
static1
Behavioral task
behavioral1
Sample
32Bit.bin.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
32Bit.bin.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
32Bit.bin.exe
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\Desktop\!! YOUR FILES HAS BEEN ENCRYPTED !!.txt
Family
crypt32
Ransom Note
Your files has been encrypted by ransomware!
and You can't decrypt with money.
Please install heroes of the storm to decrypt your files.
Attention: DO NOT TURN OFF YOUR PC! IF YOU TURNED OFF YOUR PC, YOU WON'T ABLE TO DECRYPT YOUR FILES!
Emergency contact: [email protected]
Warning - Any attmpt of decryption file will delete your private key.
당신의 파일들은 랜섬웨어에 의해 암호화되었습니다.
그리고 돈을 줘도 풀 수 없습니다.
히어로즈 오브 더 스톰을 설치해서 파일들을 복호화하세요.
경고: PC를 끄지 마세요! PC를 끄면 파일을 복원할 수 없습니다!
긴급 연락 이메일: [email protected]
경고: 복호화를 시도하면 파일들은 절대 다시 풀 수 없습니다.
Emails
Signatures
-
Crypt32 Ransomware
Javascript Fan-extortionist malware which demands victims install Heroes of the Storm instead of a monetary ransom. Uses Crypto-JS library for encryption.
-
Executes dropped EXE 1 IoCs
pid Process 4084 node.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\Users\Admin\Desktop\desktop.ini node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000200000001ad52-2.dat js behavioral2/files/0x000100000001aeb9-110.dat js -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4084 node.exe 4084 node.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4084 3876 32Bit.bin.exe 74 PID 3876 wrote to memory of 4084 3876 32Bit.bin.exe 74 PID 3876 wrote to memory of 4084 3876 32Bit.bin.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\32Bit.bin.exe"C:\Users\Admin\AppData\Local\Temp\32Bit.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\node.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\node.exe" encrypt_ransom2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
PID:4084
-