Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
27/11/2020, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
22222.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
22222.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
22222.exe
-
Size
112KB
-
MD5
429a052071b8a18293ab4f849cb80b97
-
SHA1
c361bc4d23493335b4bd4d505b8e447a18b15b8d
-
SHA256
e90cd8761306b7ee94fa9561e36a49323edb9a6e27213def9ecc93dbae3f2fb7
-
SHA512
f90d6ada90505500b954a5ba348787bc5442842253b89b74bb0775281cfb0ba387d4d932a49c76c317f842f72e1003fd4e0dd1b4ada7e1dbc8457d445ba28e47
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\UseInstall.tif.pfd24r 22222.exe File renamed C:\Users\Admin\Pictures\UseInstall.tif => C:\Users\Admin\Pictures\UseInstall.tif.pfd24r 22222.exe File created C:\Users\Admin\Pictures\BlockSave.tiff.pfd24r 22222.exe File renamed C:\Users\Admin\Pictures\BlockSave.tiff => C:\Users\Admin\Pictures\BlockSave.tiff.pfd24r 22222.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.pfd24r 22222.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.