Analysis

  • max time kernel
    104s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    17/09/2020, 01:58

General

  • Target

    DogeCrypt.exe

  • Size

    336KB

  • MD5

    016dd707baf9509b8a83234dded5712c

  • SHA1

    310f48e03fc9d6d098eff496a9b4de0ff29c9c39

  • SHA256

    bbc71c57a9b781e7c2a6472e86f25fb088c916879cebfcc4d08bef9e7e04555a

  • SHA512

    afe9548b59cfe2d879aad107a238da85ab1dd514b9c92dc6ff51dd0654dfa08890645104591d0bab280ba3d6efc50e608cc0d57bd7c56dae0d2af745eaa907e4

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DogeCrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\DogeCrypt.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    PID:672
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\note.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2044-1-0x000007FEF7AF0000-0x000007FEF7D6A000-memory.dmp

    Filesize

    2.5MB