Analysis

  • max time kernel
    1511s
  • max time network
    1467s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2024 01:17

General

  • Target

    ransomware-builder-main/CrypterBuilder/BuilderGuiAbsBase.py

  • Size

    51KB

  • MD5

    a399aec98d5661b4a2bc2c56b73c10de

  • SHA1

    a038e2eaecb3f69133d3b5213cdf093c3c7f65ee

  • SHA256

    3480827a4c4d657037f28a7c9c41a4dc91f7f8144be0a7025acc689ec696552a

  • SHA512

    700666b369cfa5f6960af22e0fc0e6d9e982555d57c07b80e3692e6a084773e48c4517e64785a1bbc0b39e4f04df9e976d4de472d8bd84e87b8c94ad6cd2558f

  • SSDEEP

    768:xOTWAvBdXlGI5vXiSztdJE4islfDJEfEPjBWJyDyMihGSSJf0RC7c25ITzgSd5T7:xKdXlGI5vXiSz5lufgihGSSJXTBW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ransomware-builder-main\CrypterBuilder\BuilderGuiAbsBase.py
    1⤵
    • Modifies registry class
    PID:3348
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2332
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1832
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4008-0-0x00000187FFB90000-0x00000187FFBA0000-memory.dmp

      Filesize

      64KB

    • memory/4008-16-0x00000187FFC90000-0x00000187FFCA0000-memory.dmp

      Filesize

      64KB

    • memory/4008-32-0x00000187FFF70000-0x00000187FFF71000-memory.dmp

      Filesize

      4KB

    • memory/4008-33-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-34-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-35-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-36-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-37-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-38-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-39-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-40-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-41-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-42-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-43-0x00000187FFFA0000-0x00000187FFFA1000-memory.dmp

      Filesize

      4KB

    • memory/4008-44-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-46-0x00000187FFFA0000-0x00000187FFFA1000-memory.dmp

      Filesize

      4KB

    • memory/4008-49-0x00000187FFF90000-0x00000187FFF91000-memory.dmp

      Filesize

      4KB

    • memory/4008-52-0x00000187FFE00000-0x00000187FFE01000-memory.dmp

      Filesize

      4KB

    • memory/4008-64-0x00000187FFF00000-0x00000187FFF01000-memory.dmp

      Filesize

      4KB

    • memory/4008-66-0x00000187FFF10000-0x00000187FFF11000-memory.dmp

      Filesize

      4KB

    • memory/4008-67-0x00000187FFF10000-0x00000187FFF11000-memory.dmp

      Filesize

      4KB

    • memory/4008-68-0x00000187FFF20000-0x00000187FFF21000-memory.dmp

      Filesize

      4KB