Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-03-2022 16:17

General

  • Target

    CAD.exe

  • Size

    261KB

  • MD5

    1c249309871bae43fe787df7976df355

  • SHA1

    12da8b967fd7a4a64f3836372430c5862ee24528

  • SHA256

    8a1d46b80f61c17f62139c1b46be9208e09055e821d8bed59532089fa5b21b48

  • SHA512

    8127487529543ff3d5240bc4ea7fc3c6dd8f802ea522267c3b73224dfc13bbcac311c521c636f5874306d9694e19d1e71a1b4d25b2ac1c57d1a82d095ce47d73

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    cadransomware@gmail.com
  • Password:
    AAss2288

Signatures

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CAD.exe
    "C:\Users\Admin\AppData\Local\Temp\CAD.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1488
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\CAD Recovery Information.txt
    1⤵
      PID:448

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\CAD Recovery Information.txt
      MD5

      e7c28e706b566263442f9ee1720d97a1

      SHA1

      1af9ea1a4bd58ed200b1908e6273c5d058bc8dfd

      SHA256

      804b96e24ce539fdc7a1929442a7d543a82741750352ae0087cef2ab53cc6343

      SHA512

      1857373bf55d5e5512b664bb1c49bcb8d22855891532a23232db4e64a3cd701e970beeda6650e9a90e401b893eb56ef28514811658ddd11cbebabbd0a5c7c979

    • memory/1488-130-0x0000018BA9220000-0x0000018BA9266000-memory.dmp
      Filesize

      280KB

    • memory/1488-131-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp
      Filesize

      10.8MB

    • memory/1488-132-0x0000018BAB260000-0x0000018BC3260000-memory.dmp
      Filesize

      384.0MB