Analysis

  • max time kernel
    10s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    19/05/2021, 09:11

General

  • Target

    68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09.exe

  • Size

    10KB

  • MD5

    c41d36f50230996c2c0f6b245658f930

  • SHA1

    02abda2ec6cc3ea0eb8067c598079d7808df51f3

  • SHA256

    68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09

  • SHA512

    21ba1ee1886552a240d2c2c5e842d96cada8eb518f04f42526e33bb08a939caa3f699b1d3dff80a803d6ce22d4241ffb72772c1c90c1149b5cf22a85b57eaa51

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09.exe
    "C:\Users\Admin\AppData\Local\Temp\68eddce0bad4515b40581f454e479a42fdd3b89e004fbba162acf339fbe46f09.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oxu.txt
      2⤵
        PID:1788

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3176-114-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB