Analysis

  • max time kernel
    196s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    27-12-2021 03:00

General

  • Target

    Cincoo.exe

  • Size

    423KB

  • MD5

    7976be9650ff52c6d9900a10999b1aa3

  • SHA1

    fe28575b83718ac91e2e4dea643d0e897ef80b59

  • SHA256

    9ccba9179e1e36fc5571738fb046617955e9d145116b2aa028e335e5d7153b99

  • SHA512

    b9eb73fa9a32d23329dca575359ef1ecb896cd41cff92272ded1de9c7983eecfb263675d2aee54fad9acaec31436df10b5d598d90e5a07c60680a003ab108b55

Malware Config

Signatures

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cincoo.exe
    "C:\Users\Admin\AppData\Local\Temp\Cincoo.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops file in Program Files directory
    PID:812
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:268
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:1916

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\README.txt
      MD5

      b8ece6bef34abe9feabb67e36b651a09

      SHA1

      5413c77856af4bb7e66f8a414e2aa96bc371abb1

      SHA256

      9f80c38a442feaf5a8bae62ec50caedf52fc818446e675d8fcc9b458b54e3785

      SHA512

      3c6f02ac2b7ba602511dc5ba5886da4dbb4db4e2a2942eafc3f24c4c596cddfb78ef812e52ee306f8b76b7b9977707df99de3b5b1a9c93ca0b461642ecefee1f

    • memory/268-54-0x000007FEFC521000-0x000007FEFC523000-memory.dmp
      Filesize

      8KB