Overview
overview
10Static
static
10Ransomware.Thanos.zip
windows7-x64
Ransomware.Thanos.zip
windows10-2004-x64
158bfb9fa88...1f.exe
windows7-x64
58bfb9fa88...1f.exe
windows10-2004-x64
105d40615701...3d.exe
windows7-x64
5d40615701...3d.exe
windows10-2004-x64
9ae66e009e1...75.exe
windows7-x64
ae66e009e1...75.exe
windows10-2004-x64
c460fc0d4f...50.exe
windows7-x64
c460fc0d4f...50.exe
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2023 12:07
Behavioral task
behavioral1
Sample
Ransomware.Thanos.zip
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
Ransomware.Thanos.zip
Resource
win10v2004-20231130-en
Behavioral task
behavioral3
Sample
58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f.exe
Resource
win7-20231130-en
Behavioral task
behavioral4
Sample
58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f.exe
Resource
win10v2004-20231130-en
Behavioral task
behavioral5
Sample
5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe
Resource
win7-20231201-en
Behavioral task
behavioral6
Sample
5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral7
Sample
ae66e009e16f0fad3b70ad20801f48f2edb904fa5341a89e126a26fd3fc80f75.exe
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
ae66e009e16f0fad3b70ad20801f48f2edb904fa5341a89e126a26fd3fc80f75.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral9
Sample
c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850.exe
Resource
win10v2004-20231127-en
General
-
Target
Ransomware.Thanos.zip
-
Size
145KB
-
MD5
00184463f3b071369d60353c692be6f0
-
SHA1
d3c1e90f39da2997ef4888b54d706b1a1fde642a
-
SHA256
cd0f55dd00111251cd580c7e7cc1d17448faf27e4ef39818d75ce330628c7787
-
SHA512
baa931a23ecbcb15dda6a1dc46d65fd74b46ccea8891c48f0822a8a10092b7d4f7ea1dc971946a161ac861f0aa8b99362d5bea960b47b10f8c91e33d1b018006
-
SSDEEP
3072:fn8L7y+NJQpRhkU0kbH2PNo/1GjTqOncYIOSsk:f8L7xNJQFzCo/ojTqOnYD
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 2024 svchost.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Ransomware.Thanos.zip1⤵PID:3560
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD51e72aa676bb11009d9ac1b09849673bb
SHA1cbe294a900a6ef48b9cac4be363ef0b67ab1f213
SHA25612516fccbfd46391b3328d959cd690e7744e7c6d5e1eeed34c86280befc58b9a
SHA5128a8a9e09372b7eeabacb86bf5db088d1f73d74fa4d240ac70dc41d7d4086ebd3790fff2fcd47a9e3555ca69d53c5e6f14ddf22ad06de7cce9ca4ce0e4184d4a7