Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25/05/2021, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
Resource
win10v20210410
General
-
Target
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
-
Size
126KB
-
MD5
e1ff64f0910b1e31a12a17ecc9173250
-
SHA1
edee8ab5e9edae3c6f7fbff32151c9d9e2c7f360
-
SHA256
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a
-
SHA512
10364700d1dd533bbf2345908067129386e119cb434ceaff55282a2ee2cc58fc9ddfca40fbc3e333dd4394436eabeb5c29268c088f94eec95abc69921af48428
Malware Config
Extracted
C:\Users\Admin\Desktop\READ_ME.crypted.txt
36yFAmBGNDowqjXxbaPA2F3byPUoxWfZyz
Signatures
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\HideOut.raw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\HideTrace.crw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\InstallAssert.tiff.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Pictures\InstallAssert.tiff a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\MoveUpdate.crw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\CompressEnter.crw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\DisconnectSwitch.tif.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\GetBlock.raw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3904 a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe"C:\Users\Admin\AppData\Local\Temp\a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:3904