Resubmissions
20/03/2021, 12:32
210320-gtx5d6h67a 10Analysis
-
max time kernel
17s -
max time network
62s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20/03/2021, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe
Resource
win10v20201028
General
-
Target
d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe
-
Size
9.8MB
-
MD5
1916caf047d83174cb7ce28d07f54f25
-
SHA1
02ca0f3ad95e5dbf3dfd1272db8cb77e5e6e3f49
-
SHA256
d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94
-
SHA512
99159edf3e297826a1c355e8fcac4d381ec66ad28df8c39fb0ca29119e718d2cb9cb45a3cf6943704916abc4c4c1891b158a99faf15d27bf6257bdaffca18012
Malware Config
Signatures
-
DemonWare
Ransomware first seen in mid-2020.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\LockUninstall.png => C:\Users\Admin\Pictures\LockUninstall.png.DEMON d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe -
Loads dropped DLL 33 IoCs
pid Process 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 1260 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1260 1452 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 76 PID 1452 wrote to memory of 1260 1452 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 76 PID 1452 wrote to memory of 1260 1452 d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe"C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe"C:\Users\Admin\AppData\Local\Temp\d46eaf1ca21fe46e0cde0f28a7db2ee7c34e710d11083472861522f8ccc20a94.exe_.exe"2⤵
- Modifies extensions of user files
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1260
-