Resubmissions

19/11/2020, 11:31

201119-qt7r33qcre 8

19/11/2020, 08:31

201119-pvsltmgsys 8

Analysis

  • max time kernel
    22s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19/11/2020, 08:31

General

  • Target

    f94fbc387e32abb67244f5130becb5f50d8094726eaf592fd71ba94c4efd17b1.exe

  • Size

    130KB

  • MD5

    c6d312f61bfa434c22e7c1eccb334b90

  • SHA1

    6741b06dfbcf8fcbf2d409af021ca8f94eeb7124

  • SHA256

    f94fbc387e32abb67244f5130becb5f50d8094726eaf592fd71ba94c4efd17b1

  • SHA512

    23ccd656c1d36cb3d3c15068d63c8608f2508b2212562dd60624fe7bf292c0dea3a8f54bad70efd2df8f4d6eb3d33ff222fab4826bebb59231ec7b6a055fa07c

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 35 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f94fbc387e32abb67244f5130becb5f50d8094726eaf592fd71ba94c4efd17b1.exe
    "C:\Users\Admin\AppData\Local\Temp\f94fbc387e32abb67244f5130becb5f50d8094726eaf592fd71ba94c4efd17b1.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    PID:1684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads