Resubmissions

14-12-2023 12:07

231214-pajw2sehe8 10

14-12-2023 12:03

231214-n8hk7sddfj 10

Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2023 12:03

General

  • Target

    Ransomware.Thanos.zip

  • Size

    145KB

  • MD5

    00184463f3b071369d60353c692be6f0

  • SHA1

    d3c1e90f39da2997ef4888b54d706b1a1fde642a

  • SHA256

    cd0f55dd00111251cd580c7e7cc1d17448faf27e4ef39818d75ce330628c7787

  • SHA512

    baa931a23ecbcb15dda6a1dc46d65fd74b46ccea8891c48f0822a8a10092b7d4f7ea1dc971946a161ac861f0aa8b99362d5bea960b47b10f8c91e33d1b018006

  • SSDEEP

    3072:fn8L7y+NJQpRhkU0kbH2PNo/1GjTqOncYIOSsk:f8L7xNJQFzCo/ojTqOnYD

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Ransomware.Thanos.zip
    1⤵
      PID:3308
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4928
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4884

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

        Filesize

        16KB

        MD5

        968c2bbe74f534824f9dbde05ed1a5e0

        SHA1

        86e89f5a1d47ef6150d7940877d4509c9e0e4fb0

        SHA256

        05f65b557462296193d9d2cbcec522ce89e27fc657f2c37c3f76a04eb6698af5

        SHA512

        b2a4bbac8f7c13c27092d1a8bc4eeb001cf2203cf52f400f84ee1cecc4795954aca139baef8727597788a52f3d11b49b2f6d52c669b579a960bb5fbb69ef70a7

      • memory/4884-40-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-33-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-42-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-34-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-35-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-36-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-37-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-38-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-43-0x000001E16C7B0000-0x000001E16C7B1000-memory.dmp

        Filesize

        4KB

      • memory/4884-0-0x000001E164470000-0x000001E164480000-memory.dmp

        Filesize

        64KB

      • memory/4884-68-0x000001E16CA00000-0x000001E16CA01000-memory.dmp

        Filesize

        4KB

      • memory/4884-32-0x000001E16CB60000-0x000001E16CB61000-memory.dmp

        Filesize

        4KB

      • memory/4884-39-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB

      • memory/4884-44-0x000001E16C7A0000-0x000001E16C7A1000-memory.dmp

        Filesize

        4KB

      • memory/4884-46-0x000001E16C7B0000-0x000001E16C7B1000-memory.dmp

        Filesize

        4KB

      • memory/4884-49-0x000001E16C7A0000-0x000001E16C7A1000-memory.dmp

        Filesize

        4KB

      • memory/4884-52-0x000001E16C6E0000-0x000001E16C6E1000-memory.dmp

        Filesize

        4KB

      • memory/4884-16-0x000001E164570000-0x000001E164580000-memory.dmp

        Filesize

        64KB

      • memory/4884-64-0x000001E16C8E0000-0x000001E16C8E1000-memory.dmp

        Filesize

        4KB

      • memory/4884-66-0x000001E16C8F0000-0x000001E16C8F1000-memory.dmp

        Filesize

        4KB

      • memory/4884-67-0x000001E16C8F0000-0x000001E16C8F1000-memory.dmp

        Filesize

        4KB

      • memory/4884-41-0x000001E16CB90000-0x000001E16CB91000-memory.dmp

        Filesize

        4KB