Resubmissions

24/11/2020, 10:13

201124-jt8mhn46hx 10

24/11/2020, 10:10

201124-ykqpsbcqtn 4

Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    24/11/2020, 10:13

General

  • Target

    Cyborg Builder Ransomware V 1.0.exe

  • Size

    2.5MB

  • MD5

    5ad1631fe97a0345cbccf8802468fa7a

  • SHA1

    8599c32e71d39bbd89b7fcae419fdf4619a6d2f3

  • SHA256

    7f5efdf9e9273ed21f90bb095a34140e70d6f38d074c3f0aebfa2e919d4a82cc

  • SHA512

    2acd63d433d33d5a98710da732cddc873655f97848fa4f9672632f956f14e594da96a0e63af39fcf948cc078eb44ea26e424af6eabb771c4acdb97e4f7150814

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 57 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cyborg Builder Ransomware V 1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Cyborg Builder Ransomware V 1.0.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3304
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:3624
    • C:\Users\Admin\Desktop\Ransom1.exe
      "C:\Users\Admin\Desktop\Ransom1.exe"
      1⤵
      • Executes dropped EXE
      PID:1976

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads