Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
06/06/2021, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
sample.exe
-
Size
171KB
-
MD5
d3d0035a769e6ef98b1433160b2c8333
-
SHA1
be1d0aed32308166721d4756e2216dc44c2d0baa
-
SHA256
6b6158f74dbd43b8c839d5ae65d33ae9a11c9e3cef5fa52d86105983a67cdc4f
-
SHA512
b86b1ab9ad2c4c851c8712d0e49321cd3f9671815592bd4228664d236093cbb904f091dc7ad60815a56da5f9face2ce11fbd84790afca4d480ae17fa76dcb229
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\FormatSplit.raw.mcburglar sample.exe File created C:\Users\Admin\Pictures\RedoConvertTo.tif.mcburglar sample.exe File created C:\Users\Admin\Pictures\SetFormat.png.mcburglar sample.exe File created C:\Users\Admin\Pictures\UnprotectResolve.tiff.mcburglar sample.exe File opened for modification C:\Users\Admin\Pictures\UnprotectResolve.tiff sample.exe File created C:\Users\Admin\Pictures\UpdateRepair.tif.mcburglar sample.exe File created C:\Users\Admin\Pictures\ExportDeny.tiff.mcburglar sample.exe File opened for modification C:\Users\Admin\Pictures\ExportDeny.tiff sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 9 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini sample.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini sample.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini sample.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini sample.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini sample.exe