Analysis

  • max time kernel
    196s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    27/12/2021, 03:00

General

  • Target

    Cincoo.exe

  • Size

    423KB

  • MD5

    7976be9650ff52c6d9900a10999b1aa3

  • SHA1

    fe28575b83718ac91e2e4dea643d0e897ef80b59

  • SHA256

    9ccba9179e1e36fc5571738fb046617955e9d145116b2aa028e335e5d7153b99

  • SHA512

    b9eb73fa9a32d23329dca575359ef1ecb896cd41cff92272ded1de9c7983eecfb263675d2aee54fad9acaec31436df10b5d598d90e5a07c60680a003ab108b55

Malware Config

Signatures

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cincoo.exe
    "C:\Users\Admin\AppData\Local\Temp\Cincoo.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops file in Program Files directory
    PID:812
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:268
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:1916

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/268-54-0x000007FEFC521000-0x000007FEFC523000-memory.dmp

      Filesize

      8KB