Analysis

  • max time kernel
    153s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2022, 04:06

General

  • Target

    HEUR-Trojan-Ransom.MSIL.Gen.gen-d1a6bd542d3570297f37ef478a638a2c7e04645cfb66fef1abe8210aa41c48a8.exe

  • Size

    273KB

  • MD5

    1d96091dc25660ac8989193299659be7

  • SHA1

    bc95772709ad585d528e43de2af29ed0bb628841

  • SHA256

    d1a6bd542d3570297f37ef478a638a2c7e04645cfb66fef1abe8210aa41c48a8

  • SHA512

    8c47793a478b0aaf12353ee1f1b2883c0a64eba1511889d33a6782e47f0ac8755dc3b594f2a74820f155243f215f015eb216ef62b6500a8fe9cc0d9cbe0baaa2

  • SSDEEP

    3072:U+vMJOW7ySZS3XbhbbzPZEhIUejpSvA+jJwktRCoWvgDcephDZhAzN0V:6GSAHNbbdsjDIcHWvg4efvA

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 7 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Gen.gen-d1a6bd542d3570297f37ef478a638a2c7e04645cfb66fef1abe8210aa41c48a8.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Gen.gen-d1a6bd542d3570297f37ef478a638a2c7e04645cfb66fef1abe8210aa41c48a8.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:3136

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3136-132-0x0000000000B10000-0x0000000000B5A000-memory.dmp

          Filesize

          296KB

        • memory/3136-133-0x0000000005A20000-0x0000000005FC4000-memory.dmp

          Filesize

          5.6MB

        • memory/3136-134-0x0000000005510000-0x00000000055A2000-memory.dmp

          Filesize

          584KB

        • memory/3136-135-0x00000000056B0000-0x00000000056BA000-memory.dmp

          Filesize

          40KB