Analysis
-
max time kernel
104s -
max time network
67s -
platform
windows7_x64 -
resource
win7 -
submitted
17/09/2020, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
DogeCrypt.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DogeCrypt.exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
DogeCrypt.exe
-
Size
336KB
-
MD5
016dd707baf9509b8a83234dded5712c
-
SHA1
310f48e03fc9d6d098eff496a9b4de0ff29c9c39
-
SHA256
bbc71c57a9b781e7c2a6472e86f25fb088c916879cebfcc4d08bef9e7e04555a
-
SHA512
afe9548b59cfe2d879aad107a238da85ab1dd514b9c92dc6ff51dd0654dfa08890645104591d0bab280ba3d6efc50e608cc0d57bd7c56dae0d2af745eaa907e4
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\InstallRedo.tiff DogeCrypt.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Control Panel\Desktop\Wallpaper = "C:\\DOGECRYPTinfo.jpg" DogeCrypt.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 832 NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\DogeCrypt.exe"C:\Users\Admin\AppData\Local\Temp\DogeCrypt.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
PID:672
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\note.txt1⤵
- Opens file in notepad (likely ransom note)
PID:832