Overview
overview
4Static
static
GartnerDef...s.docx
windows7-x64
4GartnerDef...s.docx
windows10-2004-x64
1SetWallpaper.exe
windows7-x64
1SetWallpaper.exe
windows10-2004-x64
1encrypt.bat
windows7-x64
3encrypt.bat
windows10-2004-x64
3index.html
windows7-x64
1index.html
windows10-2004-x64
1ransomware.exe
windows7-x64
1ransomware.exe
windows10-2004-x64
1Analysis
-
max time kernel
64s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
GartnerDefinitions.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GartnerDefinitions.docx
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SetWallpaper.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
SetWallpaper.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
encrypt.bat
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
encrypt.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
index.html
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
index.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ransomware.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ransomware.exe
Resource
win10v2004-20220812-en
General
-
Target
encrypt.bat
-
Size
950B
-
MD5
0124934376b3d4b7695386fa58f47ca3
-
SHA1
7f9dcfd22afa725e6f206cf233601a80f5e33a2b
-
SHA256
578d6397b036e14e6fad668b7a2ef6b0cdfe850980a6dcde6ec0cf609bc033c5
-
SHA512
6192ba4e38db84272c785405fcd779218380e2977672851aa3753464bc568566d6f2b32d09bbde46793b3d45f9edebf985fa8129371e764dca2a0e2d7582d644
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4484 4440 cmd.exe 85 PID 4440 wrote to memory of 4484 4440 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\encrypt.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\system32\xcopy.exexcopy "C:\Users\Administrator\Desktop\*" "C:\Users\Administrator\Documents\Desktop" /e /y2⤵PID:4484
-