Analysis
-
max time kernel
18s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10/12/2020, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe
Resource
win10v20201028
General
-
Target
c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe
-
Size
3.0MB
-
MD5
1441e78b9e6ce78dd02e7491b25e7f9e
-
SHA1
8c355fd0e062152a403cb0c42412850b60524aac
-
SHA256
c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e
-
SHA512
52e34a8ea136783e2009700b330e7db32e817ab0420c77e6cf47ab79c385635036ac4b547d6d1ee7542eb1e2e0b88f741289b96bf66dde18f1fdd03cb554d023
Malware Config
Extracted
C:\$Recycle.Bin\INFECTION-HELP.txt
http://corpleaks.net
http://hxt254aygrsziejn.onion
Signatures
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\FormatUse.tif => C:\Users\Admin\Pictures\FormatUse.tif.INFECTION c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File renamed C:\Users\Admin\Pictures\OutCopy.crw => C:\Users\Admin\Pictures\OutCopy.crw.INFECTION c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File renamed C:\Users\Admin\Pictures\ProtectTrace.png => C:\Users\Admin\Pictures\ProtectTrace.png.INFECTION c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\SetSave.tiff c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File renamed C:\Users\Admin\Pictures\SetSave.tiff => C:\Users\Admin\Pictures\SetSave.tiff.INFECTION c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\StopEnter.tiff c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File renamed C:\Users\Admin\Pictures\StopEnter.tiff => C:\Users\Admin\Pictures\StopEnter.tiff.INFECTION c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe -
Drops desktop.ini file(s) 25 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1985363256-3005190890-1182679451-1000\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Searches\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Pictures\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Videos\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Links\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Videos\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Desktop\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Downloads\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Libraries\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Documents\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Documents\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\Music\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Music\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.bin.sample.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
PID:3636