Analysis
-
max time kernel
34s -
max time network
20s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15/02/2021, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
Word document.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Word document.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
Word document.exe
-
Size
860KB
-
MD5
a1b86218cd460f7ec63bb0e8e97cacaf
-
SHA1
2ced2422fa7d1bd36edb411d4881d0488d0ac71c
-
SHA256
e858c09b00ed06ba71a17f4791b6264ab9cfac3dcc9d61df10f9b2a1e7b072e4
-
SHA512
e467adac35d38b69d9a48f1cedb98b249c96c2412f9efd00bef6e680f3494d3c46c8ad83ab0e17462f2056cf91fd32e7707d1b4d4736aa515229359b115767c2
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\Desktop\Artemon.txt
Ransom Note
Hello! You victim on ARTEMON RANSOMWARE!
your files encrypted
For decryption, you must send us 0.001 BTC
For decryption, you must send us 0.001 BTC
For decryption, you must send us 0.001 BTC
For decryption, you must send us 0.001 BTC
Adress BTC: 36bUzEo3hksCZfQ4GTCogZnWc5ZTTtv3MD
Your key that you should send to us: eycfs-50dsY-YiVip-GoP00X
Your key that you should send to us: eycfs-50dsY-YiVip-GoP00X
Your key that you should send to us: eycfs-50dsY-YiVip-GoP00X
Within 1-2 days, we will send you a password and instructions for decryption.
Copyring 2020-2021
Wallets
36bUzEo3hksCZfQ4GTCogZnWc5ZTTtv3MD
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\HelloApp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word document.exe" Word document.exe