Analysis

  • max time kernel
    104s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    17-09-2020 01:58

General

  • Target

    DogeCrypt.exe

  • Size

    336KB

  • MD5

    016dd707baf9509b8a83234dded5712c

  • SHA1

    310f48e03fc9d6d098eff496a9b4de0ff29c9c39

  • SHA256

    bbc71c57a9b781e7c2a6472e86f25fb088c916879cebfcc4d08bef9e7e04555a

  • SHA512

    afe9548b59cfe2d879aad107a238da85ab1dd514b9c92dc6ff51dd0654dfa08890645104591d0bab280ba3d6efc50e608cc0d57bd7c56dae0d2af745eaa907e4

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DogeCrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\DogeCrypt.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    PID:672
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\note.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:832

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\AddBlock.mid.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\AddStart.3g2.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\BackupPublish.MTS
  • C:\Users\Admin\Desktop\ConnectAdd.otf
  • C:\Users\Admin\Desktop\ConnectUnpublish.dll
  • C:\Users\Admin\Desktop\DisableComplete.3gp2
  • C:\Users\Admin\Desktop\DisconnectSearch.M2T
  • C:\Users\Admin\Desktop\GetSwitch.avi.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\GrantApprove.mhtml
  • C:\Users\Admin\Desktop\MoveConnect.cmd.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\OutUpdate.M2T
  • C:\Users\Admin\Desktop\PopProtect.txt.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\RegisterGrant.jpeg.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\RemoveExport.mht
  • C:\Users\Admin\Desktop\RepairShow.mov.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\RequestCheckpoint.snd
  • C:\Users\Admin\Desktop\SaveAdd.wmv.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\ShowMeasure.dib
  • C:\Users\Admin\Desktop\SkipPush.001
  • C:\Users\Admin\Desktop\SplitGet.vstm
  • C:\Users\Admin\Desktop\SplitSet.pot.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\TraceSync.WTV
  • C:\Users\Admin\Desktop\UndoRegister.ppsm.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\UnprotectCompress.vstm
  • C:\Users\Admin\Desktop\UnpublishAdd.csv.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Admin\Desktop\WatchGrant.gif.[dogeremembersss@protonmail.ch].DogeCrypt
  • C:\Users\Public\Desktop\note.txt
  • memory/2044-1-0x000007FEF7AF0000-0x000007FEF7D6A000-memory.dmp
    Filesize

    2.5MB