Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-04-2021 10:55
Static task
static1
Behavioral task
behavioral1
Sample
a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe
Resource
win10v20210410
General
-
Target
a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe
-
Size
3.0MB
-
MD5
c0d30c047b185328d266078965a68b37
-
SHA1
989ee095844cd41520e395e7e85aea475e572c1d
-
SHA256
a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327
-
SHA512
7aa4b947fbdc5e04f3a25b1401420cebb776ab51a05bfdc45996bfcd0e979368f1b7143d23fc45e128f102d2e53fcc40ae2971229f67fc0df18a74146655e105
Malware Config
Extracted
C:\$Recycle.Bin\BENTLEY-HELP.txt
BENTLEY@icloud.com
http://corpleaks.net
http://hxt254aygrsziejn.onion
Signatures
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\SetInstall.tiff a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\SetInstall.tiff => C:\Users\Admin\Pictures\SetInstall.tiff.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\ConvertFromStart.crw => C:\Users\Admin\Pictures\ConvertFromStart.crw.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\ExitSelect.tiff => C:\Users\Admin\Pictures\ExitSelect.tiff.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\HideAdd.tiff => C:\Users\Admin\Pictures\HideAdd.tiff.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\ReceiveWait.tif => C:\Users\Admin\Pictures\ReceiveWait.tif.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\AddDebug.crw => C:\Users\Admin\Pictures\AddDebug.crw.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Pictures\ExitSelect.tiff a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Pictures\HideAdd.tiff a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File renamed C:\Users\Admin\Pictures\ProtectWrite.raw => C:\Users\Admin\Pictures\ProtectWrite.raw.BENTLEY a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe -
Drops desktop.ini file(s) 27 IoCs
Processes:
a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Libraries\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Music\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Searches\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Videos\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Pictures\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Desktop\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Music\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Documents\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Downloads\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Public\Videos\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe File opened for modification C:\Users\Admin\Links\desktop.ini a4d9cf67d111b79da9cb4b366400fc3ba1d5f41f71d48ca9c8bb101cb4596327.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\desktop.iniMD5
3f39fc9e005301895911ea5033f4d8de
SHA10c414ded55bc30ed5f0b21f81bbcf7127e99fe2c
SHA2568b75daf5ccafac19d37149164d151b715236c1c0ef5594d1526c40da757da8c3
SHA5123f9f6a9fd00f7b632f0cf661e3146dee489f56981d78b471d60f8784fd2b1088217cecec2bd2b3730465e94d56661188a3b5c3b1c2de492ce753e8ab0cc1d36a