Analysis
-
max time kernel
4294189s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
11/03/2022, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
CAD.exe
Resource
win7-20220310-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
CAD.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
CAD.exe
-
Size
261KB
-
MD5
1c249309871bae43fe787df7976df355
-
SHA1
12da8b967fd7a4a64f3836372430c5862ee24528
-
SHA256
8a1d46b80f61c17f62139c1b46be9208e09055e821d8bed59532089fa5b21b48
-
SHA512
8127487529543ff3d5240bc4ea7fc3c6dd8f802ea522267c3b73224dfc13bbcac311c521c636f5874306d9694e19d1e71a1b4d25b2ac1c57d1a82d095ce47d73
Score
10/10
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
AAss2288
Signatures
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\OpenTrace.tiff CAD.exe File renamed C:\Users\Admin\Pictures\OpenTrace.tiff => C:\Users\Admin\Pictures\OpenTrace.tiff.partially.fucked CAD.exe File renamed C:\Users\Admin\Pictures\RegisterInvoke.png => C:\Users\Admin\Pictures\RegisterInvoke.png.partially.fucked CAD.exe File renamed C:\Users\Admin\Pictures\RenameMount.tif => C:\Users\Admin\Pictures\RenameMount.tif.partially.fucked CAD.exe File opened for modification C:\Users\Admin\Pictures\RevokeMount.tiff CAD.exe File renamed C:\Users\Admin\Pictures\ConnectSelect.tif => C:\Users\Admin\Pictures\ConnectSelect.tif.partially.fucked CAD.exe File renamed C:\Users\Admin\Pictures\ConvertFromComplete.png => C:\Users\Admin\Pictures\ConvertFromComplete.png.partially.fucked CAD.exe File renamed C:\Users\Admin\Pictures\ExitRedo.tif => C:\Users\Admin\Pictures\ExitRedo.tif.partially.fucked CAD.exe File renamed C:\Users\Admin\Pictures\RevokeMount.tiff => C:\Users\Admin\Pictures\RevokeMount.tiff.partially.fucked CAD.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini CAD.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 40 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X35V0ZKL\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\QVSMV6J0\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini CAD.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9WQZNFH4\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Searches\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CAD.exe File opened for modification C:\Users\Admin\Links\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YXYDN81Q\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Documents\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Music\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\318MUB20\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini CAD.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9H7KS8W3\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9Z3MD1WX\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini CAD.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini CAD.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\6GA0X34V\desktop.ini CAD.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1560 CAD.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1612 WORDPAD.EXE 1612 WORDPAD.EXE 1612 WORDPAD.EXE 1612 WORDPAD.EXE 1612 WORDPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\CAD.exe"C:\Users\Admin\AppData\Local\Temp\CAD.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\CAD Recovery Information.txt1⤵PID:1744
-
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\Desktop\CAD Recovery Information.txt"1⤵
- Suspicious use of SetWindowsHookEx
PID:1612