Resubmissions

12/03/2021, 08:12

210312-pn455svld2 6

12/03/2021, 08:08

210312-qlkwxgey26 6

Analysis

  • max time kernel
    116s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12/03/2021, 08:08

General

  • Target

    ransomw.exe

  • Size

    2.5MB

  • MD5

    8243dc32479532fcb82669da4b81a9d1

  • SHA1

    3580a4719ded43c0bbc40d2e26abc0868811a03f

  • SHA256

    4ad3332742b46d2a60a21ca009941fd85a3e58cd635df5a1c3ed0888061a1fda

  • SHA512

    8a88c38f4507e64b4cfe6d13c7e4e98ad86dc15df9051badc5fb283f1a24f4549c0c14055a3d42a59f31b8d5da074cc3f8356acce9683190dd4a95fe7ae0da4d

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 28 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransomw.exe
    "C:\Users\Admin\AppData\Local\Temp\ransomw.exe"
    1⤵
    • Drops desktop.ini file(s)
    PID:1576
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:268
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\READ_TO_DECRYPT.html
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1184

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/268-3-0x000007FEFC101000-0x000007FEFC103000-memory.dmp

      Filesize

      8KB

    • memory/1292-4-0x000007FEF6780000-0x000007FEF69FA000-memory.dmp

      Filesize

      2.5MB

    • memory/1576-2-0x0000000000400000-0x000000000069D000-memory.dmp

      Filesize

      2.6MB