Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
31-01-2022 23:48
Static task
static1
Behavioral task
behavioral1
Sample
df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe
Resource
win10v2004-en-20220113
General
-
Target
df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe
-
Size
66KB
-
MD5
c38cf7a56a285bbd15156032494f2432
-
SHA1
1b2ca5c1454cd0cf0032e2ae09f8604fb896c580
-
SHA256
df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712
-
SHA512
bd375a8b77eacac3ba2015d11e56f8ece41fe4f45cda1bcdc0b64eda9b6e7988084a5a4870b911ddd51fd4b25415b2d9996fa8ef9a63620c8012f4a8cacabcf0
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Signatures
-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exedescription ioc process File renamed C:\Users\Admin\Pictures\BlockUnpublish.raw => C:\Users\Admin\Pictures\BlockUnpublish.raw.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File renamed C:\Users\Admin\Pictures\CompressRepair.raw => C:\Users\Admin\Pictures\CompressRepair.raw.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File opened for modification C:\Users\Admin\Pictures\InvokeSelect.tiff df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File renamed C:\Users\Admin\Pictures\InvokeSelect.tiff => C:\Users\Admin\Pictures\InvokeSelect.tiff.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File renamed C:\Users\Admin\Pictures\RestorePublish.png => C:\Users\Admin\Pictures\RestorePublish.png.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File renamed C:\Users\Admin\Pictures\UnlockEnter.tif => C:\Users\Admin\Pictures\UnlockEnter.tif.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File renamed C:\Users\Admin\Pictures\UnpublishEnter.png => C:\Users\Admin\Pictures\UnpublishEnter.png.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe File renamed C:\Users\Admin\Pictures\BlockDisable.tif => C:\Users\Admin\Pictures\BlockDisable.tif.NEFILIM df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1644 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 288 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.execmd.exedescription pid process target process PID 1388 wrote to memory of 1644 1388 df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe cmd.exe PID 1388 wrote to memory of 1644 1388 df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe cmd.exe PID 1388 wrote to memory of 1644 1388 df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe cmd.exe PID 1388 wrote to memory of 1644 1388 df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe cmd.exe PID 1644 wrote to memory of 288 1644 cmd.exe timeout.exe PID 1644 wrote to memory of 288 1644 cmd.exe timeout.exe PID 1644 wrote to memory of 288 1644 cmd.exe timeout.exe PID 1644 wrote to memory of 288 1644 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe"C:\Users\Admin\AppData\Local\Temp\df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\df17933406a8f189b5a3ac728e0437ac178a6139ce18d9c25c3ba53b7e8fb712.exe" /s /f /q2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:288
-
-