Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
31-01-2022 23:48
Static task
static1
Behavioral task
behavioral1
Sample
fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe
Resource
win10v2004-en-20220113
General
-
Target
fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe
-
Size
58KB
-
MD5
6196c083282e7fe87d8039336e707e73
-
SHA1
eea8b6f959c6dd33609ff1552521cbe9dc169872
-
SHA256
fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7
-
SHA512
2c7c653597d89e6c4f7041cfc6a9805f5aa9737ec2978b2231880480fd6f875e1726c3cefa0f3149d5b409a56caf8dd8bd1bc5daee62dab00da1fbcfeabddbbc
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Signatures
-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exedescription ioc process File renamed C:\Users\Admin\Pictures\ConvertFromRename.png => C:\Users\Admin\Pictures\ConvertFromRename.png.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File renamed C:\Users\Admin\Pictures\ConvertStop.raw => C:\Users\Admin\Pictures\ConvertStop.raw.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File renamed C:\Users\Admin\Pictures\DisconnectUpdate.raw => C:\Users\Admin\Pictures\DisconnectUpdate.raw.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File opened for modification C:\Users\Admin\Pictures\InvokeExit.tiff fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File renamed C:\Users\Admin\Pictures\InvokeExit.tiff => C:\Users\Admin\Pictures\InvokeExit.tiff.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File renamed C:\Users\Admin\Pictures\ProtectDeny.raw => C:\Users\Admin\Pictures\ProtectDeny.raw.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File renamed C:\Users\Admin\Pictures\ReadSwitch.crw => C:\Users\Admin\Pictures\ReadSwitch.crw.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe File renamed C:\Users\Admin\Pictures\UninstallExpand.tif => C:\Users\Admin\Pictures\UninstallExpand.tif.NEFILIM fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 636 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1012 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.execmd.exedescription pid process target process PID 1260 wrote to memory of 636 1260 fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe cmd.exe PID 1260 wrote to memory of 636 1260 fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe cmd.exe PID 1260 wrote to memory of 636 1260 fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe cmd.exe PID 1260 wrote to memory of 636 1260 fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe cmd.exe PID 636 wrote to memory of 1012 636 cmd.exe timeout.exe PID 636 wrote to memory of 1012 636 cmd.exe timeout.exe PID 636 wrote to memory of 1012 636 cmd.exe timeout.exe PID 636 wrote to memory of 1012 636 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe"C:\Users\Admin\AppData\Local\Temp\fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe" /s /f /q2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:1012
-
-