Resubmissions

12/10/2022, 06:19

221012-g299bacgaq 10

04/10/2022, 09:54

221004-lw7nfsaeb5 10

Analysis

  • max time kernel
    139s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 06:19

General

  • Target

    16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20.exe

  • Size

    48KB

  • MD5

    4f6173eb23deaff1670b1b2f0f6882fe

  • SHA1

    8b0aa4a785803ebcd71fa71dfe5b3671c1ab6c13

  • SHA256

    16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20

  • SHA512

    192bf3985320e342d6808b5581f2dbcdfaafe57ebd6c08e067b1609568790432f03f7af123e3f7ddeafe94ad2ede11ab295fbc28c9111caf50f66af597e66735

  • SSDEEP

    768:AUAXzPLCUW6R/bUHUWSLa/SET7Q74guCNP:YC16lYHMa7TU3xP

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\RedKrypt-Notes-README.txt

Ransom Note
ALL YOUR FILES HAVE BEEN ENCRYPTED BY THE REDKRYPT RANSOMWARE Why me? RedKrypt doesn't choose victims. Victims choose RedKrypt. How I can recovery my files? You cannot use third party software for decrypt your files: you can use only the official RedKrypt Decryption Tool. Follow this istructions: 1) Copy your decryption ID 2) Write to [email protected] and send your decryption id 3) We'll reply with our conditions, and the decryption tool will be sent to you. YOUR REDKRYPT CLIENT-ID: 94D95F5C078BFBFF000306D2

Signatures

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20.exe
    "C:\Users\Admin\AppData\Local\Temp\16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4208-132-0x00007FFC5FCA0000-0x00007FFC606D6000-memory.dmp

    Filesize

    10.2MB