Analysis

  • max time kernel
    117s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    31-01-2022 23:48

General

  • Target

    fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe

  • Size

    58KB

  • MD5

    6196c083282e7fe87d8039336e707e73

  • SHA1

    eea8b6f959c6dd33609ff1552521cbe9dc169872

  • SHA256

    fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7

  • SHA512

    2c7c653597d89e6c4f7041cfc6a9805f5aa9737ec2978b2231880480fd6f875e1726c3cefa0f3149d5b409a56caf8dd8bd1bc5daee62dab00da1fbcfeabddbbc

Score
10/10

Malware Config

Extracted

Path

C:\NEFILIM-DECRYPT.txt

Ransom Note
All of your files have been encrypted with military grade algorithms. We ensure that the only way to retrieve your data is with our software. We will make sure you retrieve your data swiftly and securely when our demands are met. Restoration of your data requires a private key which only we possess. A large amount of your private files have been extracted and is kept in a secure location. If you do not contact us in seven working days of the breach we will start leaking the data. After you contact us we will provide you proof that your files have been extracted. To confirm that our decryption software works email to us 2 files from random computers. You will receive further instructions after you send us the test files. [email protected] [email protected] [email protected]

Signatures

  • Nefilim

    Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe
    "C:\Users\Admin\AppData\Local\Temp\fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe"
    1⤵
    • Modifies extensions of user files
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\fdaefa45c8679a161c6590b8f5bb735c12c9768172f81c930bb68c93a53002f7.exe" /s /f /q
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 3 /nobreak
        3⤵
        • Delays execution with timeout.exe
        PID:1012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1260-54-0x0000000075D61000-0x0000000075D63000-memory.dmp

    Filesize

    8KB