Overview
overview
3Static
static
1ransomware...ase.py
windows10-2004-x64
3ransomware...der.py
windows10-2004-x64
3ransomware...ase.py
windows10-2004-x64
3ransomware...ead.py
windows10-2004-x64
3ransomware...Gui.py
windows10-2004-x64
3ransomware...pec.py
windows10-2004-x64
3ransomware...t__.py
windows10-2004-x64
3ransomware...DME.md
windows10-2004-x64
3ransomware...der.py
windows10-2004-x64
3ransomware...ts.txt
windows10-2004-x64
1Analysis
-
max time kernel
1512s -
max time network
1490s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
ransomware-builder-main/CrypterBuilder/Base.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
ransomware-builder-main/CrypterBuilder/Builder.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ransomware-builder-main/CrypterBuilder/BuilderGuiAbsBase.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
ransomware-builder-main/CrypterBuilder/BuilderThread.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ransomware-builder-main/CrypterBuilder/Gui.py
Resource
win10v2004-20240220-en
Behavioral task
behavioral6
Sample
ransomware-builder-main/CrypterBuilder/Spec.py
Resource
win10v2004-20240220-en
Behavioral task
behavioral7
Sample
ransomware-builder-main/CrypterBuilder/__init__.py
Resource
win10v2004-20240220-en
Behavioral task
behavioral8
Sample
ransomware-builder-main/README.md
Resource
win10v2004-20240220-en
Behavioral task
behavioral9
Sample
ransomware-builder-main/builder.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
ransomware-builder-main/requirements.txt
Resource
win10v2004-20240220-en
General
-
Target
ransomware-builder-main/CrypterBuilder/Base.py
-
Size
15KB
-
MD5
57973dd6acb586c03772e218ab97e11d
-
SHA1
17f2d915b701967faa7b74e69dbfeb69580fe4a0
-
SHA256
ee5d774e79c47e245f8368fd15cb53140ac5433db8c3e458b242f0d19c798cbd
-
SHA512
98795d0b3927709f189b8770aa76d2eb756f3257c92ef9457c071801db50fd25e09627b812f506b3afe93507142f124ce751bbcd7fd365fbd8f50af897ba272e
-
SSDEEP
192:rkdsm9KBSQ4niAbQgaICfHE8etUUAEx0QTm7hA4ve3queuEJnZY+OGSuo0XW7VVr:YhQZAbQgaICfHztUxTmFV++A
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3328 svchost.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ransomware-builder-main\CrypterBuilder\Base.py1⤵
- Modifies registry class
PID:2464
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1404
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5eb8658f449527edd6e95be44a9e029d5
SHA15ff225c88d900fa13a30b3f3baaa428e97219eba
SHA256a5a00a54b9f2e39e97fe9aa3ec0f7b586bdff69bcf1789a7493b7e4324919cbf
SHA512d57db82f64c9c939fd2c591040fc06d471c47b2f2ae0beaa35015ece6762c9a2ee1d20856b6982223b5b535ee8c3360c6f50256226449ab028f1bb3f7ccca358