Analysis

  • max time kernel
    76s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    29-09-2021 20:01

General

  • Target

    04f76d44db4c3a8d810348f65e539f8d65af3ee764c058290033da8f5c508fc5.exe

  • Size

    127KB

  • MD5

    d449503da4a13fd6e8c8f15dde16949b

  • SHA1

    d9ede4f71e26f4ccd1cb96ae9e7a4f625f8b97c9

  • SHA256

    04f76d44db4c3a8d810348f65e539f8d65af3ee764c058290033da8f5c508fc5

  • SHA512

    71b602332851adb5549a8e780d351fd694691eb1c2dc286a7834d2d50a239a05aed8742e0e3b05fabfd8e272cd2fc68d3b6489d69ec3494c88f867f6e3eb8a6c

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f76d44db4c3a8d810348f65e539f8d65af3ee764c058290033da8f5c508fc5.exe
    "C:\Users\Admin\AppData\Local\Temp\04f76d44db4c3a8d810348f65e539f8d65af3ee764c058290033da8f5c508fc5.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    PID:1720

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads