Analysis

  • max time kernel
    123s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    19/05/2021, 09:11

General

  • Target

    68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09.exe

  • Size

    10KB

  • MD5

    c41d36f50230996c2c0f6b245658f930

  • SHA1

    02abda2ec6cc3ea0eb8067c598079d7808df51f3

  • SHA256

    68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09

  • SHA512

    21ba1ee1886552a240d2c2c5e842d96cada8eb518f04f42526e33bb08a939caa3f699b1d3dff80a803d6ce22d4241ffb72772c1c90c1149b5cf22a85b57eaa51

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09.exe
    "C:\Users\Admin\AppData\Local\Temp\68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oxu.txt
      2⤵
        PID:576

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/576-62-0x000007FEFC4A1000-0x000007FEFC4A3000-memory.dmp

      Filesize

      8KB

    • memory/1840-59-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB