Resubmissions

20/03/2021, 12:32

210320-gtx5d6h67a 10

Analysis

  • max time kernel
    17s
  • max time network
    62s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20/03/2021, 12:32

General

  • Target

    d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe

  • Size

    9.8MB

  • MD5

    1916caf047d83174cb7ce28d07f54f25

  • SHA1

    02ca0f3ad95e5dbf3dfd1272db8cb77e5e6e3f49

  • SHA256

    d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94

  • SHA512

    99159edf3e297826a1c355e8fcac4d381ec66ad28df8c39fb0ca29119e718d2cb9cb45a3cf6943704916abc4c4c1891b158a99faf15d27bf6257bdaffca18012

Score
10/10

Malware Config

Signatures

  • DemonWare

    Ransomware first seen in mid-2020.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe
    "C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe
      "C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe"
      2⤵
      • Modifies extensions of user files
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads