Analysis

  • max time kernel
    286s
  • max time network
    288s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    17-09-2021 07:08

General

  • Target

    5086511712357c72400c4eb50cb9c84818174ec82fcda8e682aed5738d9b17da.exe

  • Size

    53KB

  • MD5

    844bc3ea23be83905a02980a57879af2

  • SHA1

    b8bab791e68200d11ec4ee6a2824f6d281287b85

  • SHA256

    5086511712357c72400c4eb50cb9c84818174ec82fcda8e682aed5738d9b17da

  • SHA512

    38221a55bf4f50a99bd4840cbc50f1468408e4fbf48a3510cc8a1c7147aa77f109d04f86f7053d20547df24d6652ccfb9827629f22d94a78e7fdfa0039d35b05

Malware Config

Signatures

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 28 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5086511712357c72400c4eb50cb9c84818174ec82fcda8e682aed5738d9b17da.exe
    "C:\Users\Admin\AppData\Local\Temp\5086511712357c72400c4eb50cb9c84818174ec82fcda8e682aed5738d9b17da.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\5086511712357c72400c4eb50cb9c84818174ec82fcda8e682aed5738d9b17da.exe > nul
      2⤵
        PID:4068

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2559286294-2439613352-4032193287-1000\desktop.ini

      MD5

      ee5739ac854c1545e1b76f749f908bf8

      SHA1

      f638b048bc4e6522549881aa96ddf98fe5952fa4

      SHA256

      64f9e109ea4b21106f72fb3d9e4264e70c85a3c2a7d373c37a4679845c5c3f7e

      SHA512

      533568e55561bac4c268407b32619b7e6013ca5ed2dded4e9a26ee48c5ec9b69066572d6a319e84c9eb9f5581559db56afe7fa65ab8236fa50d93ed317b0f33a

    • memory/4068-116-0x0000000000000000-mapping.dmp