Analysis

  • max time kernel
    171s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 23:43

General

  • Target

    bcf0f202db47ca671ed6146040795e3c8315b7fb4f886161c675d4ddf5fdd0c4.exe

  • Size

    476KB

  • MD5

    3e96efd37777cc01cabb3401485297aa

  • SHA1

    f008e568c313b6f41406658a77313f89df07017e

  • SHA256

    bcf0f202db47ca671ed6146040795e3c8315b7fb4f886161c675d4ddf5fdd0c4

  • SHA512

    6d864561c6b1e33229da4181ecb14c8358ef3fbcdb996131d87a0b98fb3c4d8453fed4331c8b1d939546b6a7cb246f294bf82ca21799728f114b95d176ace691

  • SSDEEP

    6144:0qejsgRNGKhy9zzMOss2XWrccaaXCunmifiTbRF7WKHBQAk6Fjt0laAOzrJroCFQ:0m0ymOjZRaMhuF7LhQF6Mla7bu

Score
10/10

Malware Config

Extracted

Path

C:\odt\!!FAQ for Decryption!!.txt

Ransom Note
Good day. All your files are encrypted. For decryption contact us. Write here [email protected] We also inform that your databases, ftp server and file server were downloaded by us to our servers. * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss.

Signatures

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcf0f202db47ca671ed6146040795e3c8315b7fb4f886161c675d4ddf5fdd0c4.exe
    "C:\Users\Admin\AppData\Local\Temp\bcf0f202db47ca671ed6146040795e3c8315b7fb4f886161c675d4ddf5fdd0c4.exe"
    1⤵
    • Modifies extensions of user files
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Windows\SysWOW64\cmd.exe
      /c del C:\Users\Admin\AppData\Local\Temp\bcf0f202db47ca671ed6146040795e3c8315b7fb4f886161c675d4ddf5fdd0c4.exe >> NUL
      2⤵
        PID:3412

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads