Analysis
-
max time kernel
61s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-03-2021 16:19
Behavioral task
behavioral1
Sample
008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe
Resource
win10v20201028
General
-
Target
008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe
-
Size
1.9MB
-
MD5
d86f451bbff804e59a549f9fb33d6e3f
-
SHA1
3cb0cb07cc2542f1d98060adccda726ea865db98
-
SHA256
008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549
-
SHA512
c86ad7e1d5c445d4de9866faab578b2eb04f72ffef4fac380b7164003471b4b48b09772e735ea15205e2ab4a1f4d194d188cdeb12c7199d0824ddaba393dcaa2
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/files/0x000500000001ab83-3.dat cryptone behavioral2/files/0x000500000001ab83-4.dat cryptone -
Executes dropped EXE 1 IoCs
Processes:
Algpid Process 348 Alg -
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Algdescription ioc Process File renamed C:\Users\Admin\Pictures\SaveWait.tiff => C:\Users\Admin\Pictures\SaveWait.tiff.phoenix Alg File opened for modification C:\Users\Admin\Pictures\SaveWait.tiff.phoenix Alg File opened for modification C:\Users\Admin\Pictures\CopyGroup.crw.phoenix Alg File opened for modification C:\Users\Admin\Pictures\MergeShow.crw.phoenix Alg File renamed C:\Users\Admin\Pictures\PublishExpand.tif => C:\Users\Admin\Pictures\PublishExpand.tif.phoenix Alg File opened for modification C:\Users\Admin\Pictures\PublishExpand.tif.phoenix Alg File opened for modification C:\Users\Admin\Pictures\StepPop.tif.phoenix Alg File renamed C:\Users\Admin\Pictures\SetFind.png => C:\Users\Admin\Pictures\SetFind.png.phoenix Alg File opened for modification C:\Users\Admin\Pictures\SetFind.png.phoenix Alg File renamed C:\Users\Admin\Pictures\UndoFormat.png => C:\Users\Admin\Pictures\UndoFormat.png.phoenix Alg File opened for modification C:\Users\Admin\Pictures\UndoFormat.png.phoenix Alg File renamed C:\Users\Admin\Pictures\UninstallOptimize.crw => C:\Users\Admin\Pictures\UninstallOptimize.crw.phoenix Alg File renamed C:\Users\Admin\Pictures\CopyGroup.crw => C:\Users\Admin\Pictures\CopyGroup.crw.phoenix Alg File renamed C:\Users\Admin\Pictures\MergeShow.crw => C:\Users\Admin\Pictures\MergeShow.crw.phoenix Alg File renamed C:\Users\Admin\Pictures\SelectUnprotect.png => C:\Users\Admin\Pictures\SelectUnprotect.png.phoenix Alg File opened for modification C:\Users\Admin\Pictures\UninstallOptimize.crw.phoenix Alg File opened for modification C:\Users\Admin\Pictures\SelectUnprotect.png.phoenix Alg File renamed C:\Users\Admin\Pictures\StepPop.tif => C:\Users\Admin\Pictures\StepPop.tif.phoenix Alg -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exeAlgcmd.execmd.exedescription pid Process procid_target PID 60 wrote to memory of 348 60 008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe 79 PID 60 wrote to memory of 348 60 008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe 79 PID 348 wrote to memory of 2384 348 Alg 81 PID 348 wrote to memory of 2384 348 Alg 81 PID 60 wrote to memory of 480 60 008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe 83 PID 60 wrote to memory of 480 60 008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe 83 PID 2384 wrote to memory of 3576 2384 cmd.exe 85 PID 2384 wrote to memory of 3576 2384 cmd.exe 85 PID 480 wrote to memory of 736 480 cmd.exe 86 PID 480 wrote to memory of 736 480 cmd.exe 86 PID 480 wrote to memory of 3204 480 cmd.exe 87 PID 480 wrote to memory of 3204 480 cmd.exe 87 PID 2384 wrote to memory of 3552 2384 cmd.exe 88 PID 2384 wrote to memory of 3552 2384 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 3204 attrib.exe 3552 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe"C:\Users\Admin\AppData\Local\Temp\008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Roaming\SetupOem\AlgC:\Users\Admin\AppData\Roaming\SetupOem\Alg /go2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\SetupOem\Alg" & del "C:\Users\Admin\AppData\Roaming\SetupOem\Alg" & rd "C:\Users\Admin\AppData\Roaming\SetupOem\"3⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y4⤵PID:3576
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\SetupOem\Alg"4⤵
- Views/modifies file attributes
PID:3552
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe" & del "C:\Users\Admin\AppData\Local\Temp\008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe" & rd "C:\Users\Admin\AppData\Local\Temp\"2⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y3⤵PID:736
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549.exe"3⤵
- Views/modifies file attributes
PID:3204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d86f451bbff804e59a549f9fb33d6e3f
SHA13cb0cb07cc2542f1d98060adccda726ea865db98
SHA256008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549
SHA512c86ad7e1d5c445d4de9866faab578b2eb04f72ffef4fac380b7164003471b4b48b09772e735ea15205e2ab4a1f4d194d188cdeb12c7199d0824ddaba393dcaa2
-
MD5
d86f451bbff804e59a549f9fb33d6e3f
SHA13cb0cb07cc2542f1d98060adccda726ea865db98
SHA256008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549
SHA512c86ad7e1d5c445d4de9866faab578b2eb04f72ffef4fac380b7164003471b4b48b09772e735ea15205e2ab4a1f4d194d188cdeb12c7199d0824ddaba393dcaa2