Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 10:48

General

  • Target

    RansomWar.exe

  • Size

    76KB

  • MD5

    d78ab7014e03e0afbdfbaf134c8d3875

  • SHA1

    96de3ca62e9642de3745ef66deeee2a53cd816d1

  • SHA256

    9f26a2882657a85085c3182bc6aab2fa6a21c0cb65b8df0357ce53932ea60073

  • SHA512

    57d0c5866af56c9eaed22ecb72fd205f5f98529081afd815f29d6acd592afd5ca3a4baa7bcf87945374d2622902ad8173bf3d121c09c50836bd8a7b87c39982f

  • SSDEEP

    1536:yAkSIijLaiseJBseU6oxkaFycpPP3lLuBZnaMh0nE7ZIn+1y:yAF5qiLJBseU6kkaFDl3lUaMh0nElZ1y

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RansomWar.exe
    "C:\Users\Admin\AppData\Local\Temp\RansomWar.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x0000000076651000-0x0000000076653000-memory.dmp

    Filesize

    8KB