Analysis
-
max time kernel
123s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25/05/2021, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
Resource
win10v20210408
General
-
Target
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
-
Size
126KB
-
MD5
e1ff64f0910b1e31a12a17ecc9173250
-
SHA1
edee8ab5e9edae3c6f7fbff32151c9d9e2c7f360
-
SHA256
a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a
-
SHA512
10364700d1dd533bbf2345908067129386e119cb434ceaff55282a2ee2cc58fc9ddfca40fbc3e333dd4394436eabeb5c29268c088f94eec95abc69921af48428
Malware Config
Extracted
C:\Users\Admin\Desktop\READ_ME.crypted.txt
36yFAmBGNDowqjXxbaPA2F3byPUoxWfZyz
Signatures
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ConvertFromExport.raw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\FormatHide.raw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\MergeShow.tif.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File created C:\Users\Admin\Pictures\SplitInstall.crw.crypted a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1864 a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe"C:\Users\Admin\AppData\Local\Temp\a653a4d7a1dd36b965591b6f55584ba3d73124eccc92e94ce28a71a0f0415f5a.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:1864