Analysis

  • max time kernel
    89s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    15-09-2020 12:18

General

  • Target

    Python Ransom BlackKingdom.exe

  • Size

    9.8MB

  • MD5

    98c14f48c1ae5cbbf6ff5403336e07c3

  • SHA1

    d4b101f66a40114d3d1075d7c3a59cbbd47c707d

  • SHA256

    8dc94d486fd546ffbf8f21252aba65efe18432a6cae815e02b8be4ce4449291a

  • SHA512

    e9e88e5843fea3f0fcb2e446674b3414e2e2a6be478fb9325a2d623b50f9de009cbc0a768a2572b51de637bedf1f83f3dccf5996b1396f8a736215bfccbb310e

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\README.txt

Family

demonware

Ransom Note
Tango Down! Seems like you got hit by DemonWare ransomware! Don't Panic, you get have your files back! DemonWare uses a basic encryption script to lock your files. This type of ransomware is known as CRYPTO. You'll need a decryption key in order to unlock your files. Your files will be deleted when the timer runs out, so you better hurry. You have 10 hours to find your key C'mon, be glad I don't ask for payment like other ransomware. Please visit: https:xyz.io and search for your IP/hostname to get your key. Kind regards, arman

Signatures

  • DemonWare

    Ransomware first seen in mid-2020.

  • Loads dropped DLL 18 IoCs
  • JavaScript code in executable 13 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe
    "C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe
      "C:\Users\Admin\AppData\Local\Temp\Python Ransom BlackKingdom.exe"
      2⤵
      • Loads dropped DLL
      PID:204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\PIL\_imaging.cp38-win32.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\PIL\_imagingtk.cp38-win32.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\VCRUNTIME140.dll

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_bz2.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_ctypes.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_decimal.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_elementtree.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_hashlib.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_lzma.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_socket.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\_tkinter.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\base_library.zip

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\libcrypto-1_1.dll

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\libffi-7.dll

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\pyexpat.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\python38.dll

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\select.pyd

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl86t.dll

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\auto.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\encoding\cp1252.enc

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\http1.0\pkgIndex.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\init.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\opt0.4\pkgIndex.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\package.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\tclIndex

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl\tm.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk86t.dll

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\button.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\entry.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\icons.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\listbox.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\menu.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\panedwindow.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\pkgIndex.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\scale.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\scrlbar.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\spinbox.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\tclIndex

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\text.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\tk.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\altTheme.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\button.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\clamTheme.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\classicTheme.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\combobox.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\cursors.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\defaults.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\entry.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\fonts.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\menubutton.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\notebook.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\panedwindow.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\progress.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\scale.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\scrollbar.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\sizegrip.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\spinbox.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\treeview.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\ttk.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\utils.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\vistaTheme.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\winTheme.tcl

  • C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk\ttk\xpTheme.tcl

  • \Users\Admin\AppData\Local\Temp\_MEI29202\PIL\_imaging.cp38-win32.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\PIL\_imagingtk.cp38-win32.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\VCRUNTIME140.dll

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_bz2.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_ctypes.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_decimal.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_elementtree.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_hashlib.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_lzma.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_socket.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\_tkinter.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\libcrypto-1_1.dll

  • \Users\Admin\AppData\Local\Temp\_MEI29202\libffi-7.dll

  • \Users\Admin\AppData\Local\Temp\_MEI29202\pyexpat.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\python38.dll

  • \Users\Admin\AppData\Local\Temp\_MEI29202\select.pyd

  • \Users\Admin\AppData\Local\Temp\_MEI29202\tcl86t.dll

  • \Users\Admin\AppData\Local\Temp\_MEI29202\tk86t.dll

  • memory/204-0-0x0000000000000000-mapping.dmp