Analysis

  • max time kernel
    116s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    09/06/2021, 19:07

General

  • Target

    7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe

  • Size

    5KB

  • MD5

    08c1b410a3c20bcc4cd1ee2906c240af

  • SHA1

    97864c23a1c46e30633c9c3a2ee74e3d6de262a9

  • SHA256

    7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31

  • SHA512

    d11530a312f13b0e24009ba54751bc29d21144c474e8211bfdb3446ed4cac409049e3553eca117b29a2d3898612419bfd8dfc7a89da43c309c30c2fa19479d47

Malware Config

Signatures

  • Modifies extensions of user files 13 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe
    "C:\Users\Admin\AppData\Local\Temp\7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    PID:3176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3176-114-0x0000000000840000-0x0000000000841000-memory.dmp

    Filesize

    4KB