Analysis
-
max time kernel
62s -
max time network
67s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13/12/2021, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
WinCrypto Ransomware.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
WinCrypto Ransomware.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
WinCrypto Ransomware.exe
-
Size
4.4MB
-
MD5
27786f44811d4832d01246e529b94320
-
SHA1
b31bd516fe0ca01cd139739867ae2c60054dc328
-
SHA256
5c396be42657aecabd75f8be6ac9b3af96fa1243a4a50214b3543617f39d6c5b
-
SHA512
1904e09f2a963b725493bb11b9b18f43ffb9e132114bdcd3f05816ee80d50fcca181482bced3fafd739c425b09e6864bec93bbc4ea1365da7ffdb1dc81734dea
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\Desktop\README WINCRYPTO.txt
Ransom Note
WINCRYPTO RANSOMWARE
YOUR DOCUMENTS, PHOTOS, DATABASES AND OTHER IMPORTANT FILES HAS BEEN ENCRYPTED!
THE ONLY WAY TO DECRYPT YOUR FILES IS TO RECEIVE THE PRIVATE KEY AND DECRYPTION SOFTWARE.
TO RECEIVE THE PRIVATE KEY AND DECRYPTION SOFTWARE GO TO ANY DECRYPTED FOLDER - INSIDE
THERE IS THE SPECIAL FILE 'README WINCRYPTO.TXT' WITH COMPLETE INSTRUCTIONS HOW TO DECRYPT YOUR FILES.
IF YOU CANNOT FIND ANY 'README WINCRYPTO.TXT' FILE AT YOUR PC.
FOLLOW THE INSTRUCTIONS BELOW.
1. DOWNLOAD 'TOR BROWSER' FROM 'HTTPS://TORPROJECT.ORG' AND INSTALL IT.
2. IN THE 'TOR BROWSER' OPEN YOUR PERSONAL PAGE HERE.
HTTPS://WINCRYPTO23XA93KU9234XN.ONION/7U2D-23MA-0M8C-M2AS
NOTE! THIS PAGE IS AVAILABLE VIA 'TOR BROWSER' ONLY.
FILE RECOVERY IS IMPOSSIBLE WHEN ANTI-VIRUS IS ACTIVATED AND THIS SOFTWARE IS TERMINATED!
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RedoGet.png => C:\Users\Admin\Pictures\RedoGet.png.wincrypto WinCrypto Ransomware.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WinCrypto Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OperaSetups = "C:\\Users\\Admin\\AppData\\Roaming\\RuntimeBroker\\RuntimeBroker.exe" WinCrypto Ransomware.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3824 WinCrypto Ransomware.exe