Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
26/11/2021, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
regolamento.bin.exe
Resource
win7-en-20211104
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
regolamento.bin.exe
Resource
win10-en-20211104
0 signatures
0 seconds
General
-
Target
regolamento.bin.exe
-
Size
391KB
-
MD5
5644517be1634a30b9c32c75d52c7aa6
-
SHA1
5047b5d7e2f352e9ba6efe47e6bc805550d3552d
-
SHA256
b034243fc2a42e0c5dd70de9fa6c16d13fc1702330d68d3f885213064fd722d2
-
SHA512
a173922181e5890ac0723c51cb724c7d2885892d925314d08c4203d5e0aef5af746f42bde6e94566aaba3cd3bde623457b3f5a3b6d00abafee952de0daacba84
Score
8/10
Malware Config
Signatures
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\RemoveWrite.tiff.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\MeasureLock.crw => C:\Users\Admin\Pictures\MeasureLock.crw.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\MountRemove.crw => C:\Users\Admin\Pictures\MountRemove.crw.amogus regolamento.bin.exe File opened for modification C:\Users\Admin\Pictures\RegisterSkip.png.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\SendConvertTo.tif => C:\Users\Admin\Pictures\SendConvertTo.tif.amogus regolamento.bin.exe File opened for modification C:\Users\Admin\Pictures\MeasureLock.crw.amogus regolamento.bin.exe File opened for modification C:\Users\Admin\Pictures\MountRemove.crw.amogus regolamento.bin.exe File opened for modification C:\Users\Admin\Pictures\SearchTrace.raw.amogus regolamento.bin.exe File opened for modification C:\Users\Admin\Pictures\SearchWatch.tiff.amogus regolamento.bin.exe File opened for modification C:\Users\Admin\Pictures\SendConvertTo.tif.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\RegisterSkip.png => C:\Users\Admin\Pictures\RegisterSkip.png.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\SearchTrace.raw => C:\Users\Admin\Pictures\SearchTrace.raw.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\RemoveWrite.tiff => C:\Users\Admin\Pictures\RemoveWrite.tiff.amogus regolamento.bin.exe File renamed C:\Users\Admin\Pictures\SearchWatch.tiff => C:\Users\Admin\Pictures\SearchWatch.tiff.amogus regolamento.bin.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.amogus regolamento.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1592 regolamento.bin.exe