Analysis
-
max time kernel
12s -
max time network
104s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-03-2021 06:35
Static task
static1
Behavioral task
behavioral1
Sample
1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe
Resource
win10v20201028
General
-
Target
1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe
-
Size
12.8MB
-
MD5
d57b26a5738e3116c39122c091374c4a
-
SHA1
cc25f6a5d73ca7385a2b5beb697d51a6706d73e9
-
SHA256
1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf
-
SHA512
92a50b8205580295274c688ace588b2a2448396ee0b7ec874c95a938a7cbb525e6cea33871c88037d2b67d4ad60e4f76566fa599d82c50faa043d1dbe029aa2f
Malware Config
Extracted
C:\Users\Admin\Downloads\README.txt
bc1qpf5884eeausmv8rtf93kplu573t477tquskeuz
Signatures
-
DemonWare
Ransomware first seen in mid-2020.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RepairFind.png => C:\Users\Admin\Pictures\RepairFind.png.DEMON 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe -
Loads dropped DLL 35 IoCs
pid Process 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 3968 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3968 1192 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 76 PID 1192 wrote to memory of 3968 1192 1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe"C:\Users\Admin\AppData\Local\Temp\1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe"C:\Users\Admin\AppData\Local\Temp\1dbbd2ae295dae3cfff1769cc919aacb3b0c9d0ecf550f37f3901e2244a165cf.exe"2⤵
- Modifies extensions of user files
- Loads dropped DLL
PID:3968
-