Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
31-01-2022 23:48
Behavioral task
behavioral1
Sample
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe
Resource
win10v2004-en-20220112
General
-
Target
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe
-
Size
36KB
-
MD5
644b931e6a016a6146ebe8068f68e4cb
-
SHA1
87e2ad3e9f1ae9e1340fb3c70013fd6b508e2364
-
SHA256
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb
-
SHA512
683152462a60d24dd9151754ebc5184a4753afbfeb4a86f74d5d815ae1d3738631bd8f89c51fe56b31ddc14a590579233a0a1a5562ba49e5486387be3bb989ba
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Signatures
-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exedescription ioc process File renamed C:\Users\Admin\Pictures\DenyUnregister.raw => C:\Users\Admin\Pictures\DenyUnregister.raw.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File opened for modification C:\Users\Admin\Pictures\DismountSubmit.tiff bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File opened for modification C:\Users\Admin\Pictures\InitializeRepair.tiff bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\MeasureSelect.raw => C:\Users\Admin\Pictures\MeasureSelect.raw.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\UnregisterMount.crw => C:\Users\Admin\Pictures\UnregisterMount.crw.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\AssertInstall.tif => C:\Users\Admin\Pictures\AssertInstall.tif.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\CompressRestart.tif => C:\Users\Admin\Pictures\CompressRestart.tif.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\DisconnectPop.tif => C:\Users\Admin\Pictures\DisconnectPop.tif.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\EnableSuspend.png => C:\Users\Admin\Pictures\EnableSuspend.png.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\ExpandRegister.png => C:\Users\Admin\Pictures\ExpandRegister.png.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\MountRegister.tif => C:\Users\Admin\Pictures\MountRegister.tif.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\DismountSubmit.tiff => C:\Users\Admin\Pictures\DismountSubmit.tiff.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\InitializeRepair.tiff => C:\Users\Admin\Pictures\InitializeRepair.tiff.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe File renamed C:\Users\Admin\Pictures\ReadMount.tif => C:\Users\Admin\Pictures\ReadMount.tif.NEFILIM bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1396 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1464 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.execmd.exedescription pid process target process PID 1576 wrote to memory of 1396 1576 bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe cmd.exe PID 1576 wrote to memory of 1396 1576 bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe cmd.exe PID 1576 wrote to memory of 1396 1576 bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe cmd.exe PID 1576 wrote to memory of 1396 1576 bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe cmd.exe PID 1396 wrote to memory of 1464 1396 cmd.exe timeout.exe PID 1396 wrote to memory of 1464 1396 cmd.exe timeout.exe PID 1396 wrote to memory of 1464 1396 cmd.exe timeout.exe PID 1396 wrote to memory of 1464 1396 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe"C:\Users\Admin\AppData\Local\Temp\bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe" /s /f /q2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:1464
-
-