Analysis
-
max time kernel
225s -
max time network
181s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28/10/2021, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
IHAransom.exe
Resource
win7-en-20210920
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
IHAransom.exe
Resource
win10-en-20211014
0 signatures
0 seconds
General
-
Target
IHAransom.exe
-
Size
231KB
-
MD5
5f775c9a9d49013ef37aa7d332327af4
-
SHA1
f96eeeaebef8e4d1ed74f7c557ef2a9d3c021bc8
-
SHA256
6fafb9d3eec58313bfeb572ebeb09739a413b1df2b7755611f06ef62d8c9cf8e
-
SHA512
fb6c0231f4821ded9c1fa7045d2581bd816d9dbe792394742b946f7ba76a06e18b84078bef6e0206f5dff2e42145f6e9f9f43829dc567ca571884b60c745f31f
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConnectSplit.raw.IHA IHAransom.exe File opened for modification C:\Users\Admin\Pictures\MergeRename.tiff.IHA IHAransom.exe File opened for modification C:\Users\Admin\Pictures\SubmitTrace.tif.IHA IHAransom.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2aylA1lZf9IPqtjo.exe IHAransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2aylA1lZf9IPqtjo.exe IHAransom.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Cry.img" IHAransom.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 IHAransom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 IHAransom.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe 332 IHAransom.exe