Analysis
-
max time kernel
89s -
max time network
126s -
platform
windows10_x64 -
resource
win10 -
submitted
15-09-2020 12:18
Static task
static1
Behavioral task
behavioral1
Sample
Python Ransom BlackKingdom.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Python Ransom BlackKingdom.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Python Ransom BlackKingdom.exe
-
Size
9.8MB
-
MD5
98c14f48c1ae5cbbf6ff5403336e07c3
-
SHA1
d4b101f66a40114d3d1075d7c3a59cbbd47c707d
-
SHA256
8dc94d486fd546ffbf8f21252aba65efe18432a6cae815e02b8be4ce4449291a
-
SHA512
e9e88e5843fea3f0fcb2e446674b3414e2e2a6be478fb9325a2d623b50f9de009cbc0a768a2572b51de637bedf1f83f3dccf5996b1396f8a736215bfccbb310e
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\Downloads\README.txt
Family
demonware
Ransom Note
Tango Down!
Seems like you got hit by DemonWare ransomware!
Don't Panic, you get have your files back!
DemonWare uses a basic encryption script to lock your files.
This type of ransomware is known as CRYPTO.
You'll need a decryption key in order to unlock your files.
Your files will be deleted when the timer runs out, so you better hurry.
You have 10 hours to find your key
C'mon, be glad I don't ask for payment like other ransomware.
Please visit: https:xyz.io and search for your IP/hostname to get your key.
Kind regards,
arman
Signatures
-
DemonWare
Ransomware first seen in mid-2020.
-
Loads dropped DLL 18 IoCs
Processes:
Python Ransom BlackKingdom.exepid Process 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe 204 Python Ransom BlackKingdom.exe -
JavaScript code in executable 13 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ada3-1.dat js behavioral2/files/0x000100000001ada3-2.dat js behavioral2/files/0x000100000001adaa-5.dat js behavioral2/files/0x000100000001ad9e-16.dat js behavioral2/files/0x000100000001ad9e-17.dat js behavioral2/files/0x000100000001ada5-30.dat js behavioral2/files/0x000100000001ada5-33.dat js behavioral2/files/0x000100000001ae09-35.dat js behavioral2/files/0x000100000001ae91-39.dat js behavioral2/files/0x000100000001ae8d-40.dat js behavioral2/files/0x000100000001b10a-45.dat js behavioral2/files/0x000100000001b145-53.dat js behavioral2/files/0x000100000001b110-46.dat js -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Python Ransom BlackKingdom.exedescription pid Process procid_target PID 2920 wrote to memory of 204 2920 Python Ransom BlackKingdom.exe 73 PID 2920 wrote to memory of 204 2920 Python Ransom BlackKingdom.exe 73 PID 2920 wrote to memory of 204 2920 Python Ransom BlackKingdom.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe"C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe"C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe"2⤵
- Loads dropped DLL
PID:204
-