Analysis
-
max time kernel
188s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 20:31
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
644KB
-
MD5
a89f0c6fc0d3e498049af7373f8f8b19
-
SHA1
bd65984f8fa68fa7427f51a170821862a9a04c4d
-
SHA256
cb379333f2a796eeb8292986d12fd220937dee09a0e5a0239b2331e95b337bca
-
SHA512
5eca8d136e533b120f351d15734e17a20302590ec28224043b7a08acc45334b00345b58fa89fdc6f9f8d419803ea6586032709e5170900b3250767cd0c7a288c
-
SSDEEP
12288:uWY5nSOhCNw7eupoJDLRF9+sNU2AfDNKVmO3lys94Nq45DpWGYV0VHCwkrcsOE:uWYRYw6upoxLjksAfaF3lB94NqsQV0Vs
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Trojan-Ransom.Win32.Blocker.exe -
resource yara_rule behavioral2/memory/5112-132-0x0000000000400000-0x0000000000598000-memory.dmp upx behavioral2/memory/5112-137-0x0000000000400000-0x0000000000598000-memory.dmp upx behavioral2/memory/5112-138-0x0000000000400000-0x0000000000598000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Trojan-Ransom.Win32.Blocker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\w1ndows_61b0 = "C:\\Users\\Admin\\AppData\\Roaming\\w1ndows_61b0.exe" Trojan-Ransom.Win32.Blocker.exe