Analysis

  • max time kernel
    166s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08/07/2022, 06:30 UTC

General

  • Target

    cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682.exe

  • Size

    142KB

  • MD5

    4153cbc1f51bca54ba1e948a3653185b

  • SHA1

    090e58b0b9ce144598b375c0c206289308535ef3

  • SHA256

    cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682

  • SHA512

    d1232323496022e2e48dfa372d9d3844ebd31a2390896bca3914d246666cc29a4019313acf23458c540baa07a261023adf46da5315d21ee0557a0b5eb406fb7f

Malware Config

Signatures

  • SatanCryptor

    Golang ransomware first seen in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682.exe
    "C:\Users\Admin\AppData\Local\Temp\cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:1108

Network

    No results found
  • 93.184.220.29:80
    322 B
    7
  • 104.110.191.133:80
    322 B
    7
  • 104.110.191.133:80
    322 B
    7
  • 45.124.132.119:80
    cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682.exe
    260 B
    5
  • 20.189.173.15:443
    322 B
    7
  • 104.110.191.133:80
    322 B
    7
  • 104.110.191.133:80
    322 B
    7
  • 104.110.191.133:80
    322 B
    7
  • 93.184.220.29:80
    260 B
    5
  • 45.124.132.119:80
    cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682.exe
    260 B
    5
  • 45.124.132.119:80
    cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682.exe
    260 B
    5
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1108-130-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1108-131-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.