Analysis
-
max time kernel
144s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
27/11/2020, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
22222.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
22222.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
22222.exe
-
Size
112KB
-
MD5
429a052071b8a18293ab4f849cb80b97
-
SHA1
c361bc4d23493335b4bd4d505b8e447a18b15b8d
-
SHA256
e90cd8761306b7ee94fa9561e36a49323edb9a6e27213def9ecc93dbae3f2fb7
-
SHA512
f90d6ada90505500b954a5ba348787bc5442842253b89b74bb0775281cfb0ba387d4d932a49c76c317f842f72e1003fd4e0dd1b4ada7e1dbc8457d445ba28e47
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 22 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompressUndo.png => C:\Users\Admin\Pictures\CompressUndo.png.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\InstallRestart.tiff => C:\Users\Admin\Pictures\InstallRestart.tiff.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\RemoveRegister.raw => C:\Users\Admin\Pictures\RemoveRegister.raw.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\StartResume.tiff.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\SuspendProtect.tif => C:\Users\Admin\Pictures\SuspendProtect.tif.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\LimitSwitch.raw.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\MeasureUpdate.crw.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\MeasureUpdate.crw => C:\Users\Admin\Pictures\MeasureUpdate.crw.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\StartResume.tiff => C:\Users\Admin\Pictures\StartResume.tiff.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\ShowOut.png => C:\Users\Admin\Pictures\ShowOut.png.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\SuspendProtect.tif.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\ConnectRestart.crw.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\ConnectRestart.crw => C:\Users\Admin\Pictures\ConnectRestart.crw.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\LimitSwitch.raw => C:\Users\Admin\Pictures\LimitSwitch.raw.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\ProtectWrite.png.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\RemoveRegister.raw.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\ShowOut.png.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\BlockRevoke.crw.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\BlockRevoke.crw => C:\Users\Admin\Pictures\BlockRevoke.crw.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\CompressUndo.png.3e1w6d 22222.exe File created C:\Users\Admin\Pictures\InstallRestart.tiff.3e1w6d 22222.exe File renamed C:\Users\Admin\Pictures\ProtectWrite.png => C:\Users\Admin\Pictures\ProtectWrite.png.3e1w6d 22222.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.3e1w6d 22222.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.