Resubmissions

06-03-2023 04:51

230306-fg2wrsac3t 8

25-02-2023 05:08

230225-fsjvbscc39 10

Analysis

  • max time kernel
    97s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-03-2023 04:51

General

  • Target

    1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe

  • Size

    53KB

  • MD5

    4a6a6b20f1cf998265b089feb5012ac7

  • SHA1

    aa88da5ce9890bdf997f221a298ca18647f26288

  • SHA256

    1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb

  • SHA512

    2a103455f0665bf1a52b18c9cd2a7d21ec16e92bf061a7f4890f970705fcaddd6770fc86d88b84e855cdae4f196eb589f05a43d0ac809d00e8cd99b6daa08883

  • SSDEEP

    768:83vuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5YvgO6:8TeytM3alnawrRIwxVSHMweio3+4O

Malware Config

Signatures

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe
    "C:\Users\Admin\AppData\Local\Temp\1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\vcRuntimeMinimum_x86\how_to_back_files.html

    Filesize

    4KB

    MD5

    73746493fecaa8a77250ccf59af0c73c

    SHA1

    d9c297bccd08c56cadc5690dd09a014d5a2e22c2

    SHA256

    3c8c05762bc75c8271ca096d64c95479c5cf9c0f0333ca8e5ec24dce99e6c185

    SHA512

    f190e4aa92ae34cae14b13d83867d735044454baf2963e893646940c0b4b4fc6582816252544464be7e9787a0e24bdb61b0570cd0cd001331a9118b7f36fe877

  • memory/1680-122-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB

  • memory/1680-576-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB