Analysis
-
max time kernel
600s -
max time network
418s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/05/2023, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
fury_ctm1042.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fury_ctm1042.exe
Resource
win10v2004-20230220-en
General
-
Target
fury_ctm1042.exe
-
Size
1.2MB
-
MD5
0c8e88877383ccd23a755f429006b437
-
SHA1
69b3d913a3967153d1e91ba1a31ebed839b297ed
-
SHA256
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6
-
SHA512
ba5296a84b7107b293d1afd4752157edaa1a3f1059685ecad2ddea9b9221ee9c8092ce5cae6f2f6a4866e25ca0bf66dd3fbc0786b2a26cb708d2cd536dd85041
-
SSDEEP
24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp
Malware Config
Signatures
-
Renames multiple (611) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UninstallPing.tif => C:\Users\Admin\Pictures\UninstallPing.tif.rhysida fury_ctm1042.exe File opened for modification C:\Users\Admin\Pictures\SplitTest.png.rhysida fury_ctm1042.exe File renamed C:\Users\Admin\Pictures\NewInitialize.crw => C:\Users\Admin\Pictures\NewInitialize.crw.rhysida fury_ctm1042.exe File opened for modification C:\Users\Admin\Pictures\CopyWrite.tiff.rhysida fury_ctm1042.exe File opened for modification C:\Users\Admin\Pictures\UninstallPing.tif.rhysida fury_ctm1042.exe File renamed C:\Users\Admin\Pictures\StartProtect.crw => C:\Users\Admin\Pictures\StartProtect.crw.rhysida fury_ctm1042.exe File opened for modification C:\Users\Admin\Pictures\StartProtect.crw.rhysida fury_ctm1042.exe File renamed C:\Users\Admin\Pictures\SplitTest.png => C:\Users\Admin\Pictures\SplitTest.png.rhysida fury_ctm1042.exe File opened for modification C:\Users\Admin\Pictures\NewInitialize.crw.rhysida fury_ctm1042.exe File renamed C:\Users\Admin\Pictures\CopyWrite.tiff => C:\Users\Admin\Pictures\CopyWrite.tiff.rhysida fury_ctm1042.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.