Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 15:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Rasomware20exe.exe
Resource
win7-20230621-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Rasomware20exe.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Rasomware20exe.exe
-
Size
824KB
-
MD5
7d17a868abac9de81fe79087eee31471
-
SHA1
2d3f58ea051db43964243b8aefb7279e45e7bda9
-
SHA256
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26
-
SHA512
85ec6c3cf0908b306712041fc9d971d27349641245c29f126e01443dcc6ccd78530c789b15d345938c194009c890b42f7c95bc65deae1ef7372e5744651f9540
-
SSDEEP
24576:ntfYkVVmFFFKvvvvvvvvvvvvvvvvms4AkVVmFFFKvvvvvvvvvvvvvvvvms4n:n+vnAvn
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Rasomware20exe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" Rasomware20exe.exe -
Disables Task Manager via registry modification
-
Drops desktop.ini file(s) 1 IoCs
Processes:
Rasomware20exe.exedescription ioc process File created C:\Users\Admin\Downloads\desktop.ini Rasomware20exe.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Rasomware20exe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\Desktop\Wallpaper Rasomware20exe.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Rasomware20exe.exepid process 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe 2316 Rasomware20exe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Rasomware20exe.exedescription pid process Token: SeDebugPrivilege 2316 Rasomware20exe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rasomware20exe.exe"C:\Users\Admin\AppData\Local\Temp\Rasomware20exe.exe"1⤵
- Modifies WinLogon for persistence
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316