Analysis
-
max time kernel
5s -
max time network
113s -
platform
windows10_x64 -
resource
win10 -
submitted
16/09/2020, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
_-__----_-.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
_-__----_-.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
_-__----_-.exe
-
Size
14KB
-
MD5
65e18bae9b8c42b63bf3b969d3cdb6ca
-
SHA1
de1e804c81536890bccc963920095ade140b5173
-
SHA256
66ec6a7bb5cec8d1205685833524b4f577af75570896e0b368f16e5ee0d2a955
-
SHA512
32e45907c8ec7edeafbb699a3975ec52ae8255d692ebcfaf81ac87cbf118e069355e9c802574b707ce28a8e91aacfcda9ce185fd55910df9bcae9465c27aea15
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SuspendUnprotect.png => C:\Users\Admin\Pictures\SuspendUnprotect.png.paradox _-__----_-.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop\Wallpaper = "C:\\Admin\\wallpaper.jpg" _-__----_-.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 _-__----_-.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2728 _-__----_-.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 _-__----_-.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\_-__----_-.exe"C:\Users\Admin\AppData\Local\Temp\_-__----_-.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:2728