Analysis
-
max time kernel
116s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09/06/2021, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe
Resource
win10v20210410
General
-
Target
7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe
-
Size
5KB
-
MD5
08c1b410a3c20bcc4cd1ee2906c240af
-
SHA1
97864c23a1c46e30633c9c3a2ee74e3d6de262a9
-
SHA256
7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31
-
SHA512
d11530a312f13b0e24009ba54751bc29d21144c474e8211bfdb3446ed4cac409049e3553eca117b29a2d3898612419bfd8dfc7a89da43c309c30c2fa19479d47
Malware Config
Signatures
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\InitializeDismount.raw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\JoinInvoke.crw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\MoveSubmit.crw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\OptimizeResume.tiff.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\ProtectCheckpoint.tif.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\ConvertFromMove.tif.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\CopyApprove.tif.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\EditDebug.crw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\EnableStep.crw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\ResolveReceive.tif.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\TestSend.crw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\ApproveGet.tif.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe File created C:\Users\Admin\Pictures\CompareDeny.crw.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.sick 7dc40a9e663d516089df8a653d79bcd705425fc74caf56b32f45c4786b51ba31.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.