Overview
overview
10Static
static
3Ransomware...in.zip
windows10-1703-x64
1Ransomware...er.zip
windows10-1703-x64
1cerber.exe
windows10-1703-x64
10Ransomware...ll.zip
windows10-1703-x64
1cryptowall.exe
windows10-1703-x64
3Ransomware...aw.zip
windows10-1703-x64
1jigsaw.exe
windows10-1703-x64
10Ransomware...ICENSE
windows10-1703-x64
1Ransomware...ky.zip
windows10-1703-x64
1Locky.exe
windows10-1703-x64
10Ransomware...ba.zip
windows10-1703-x64
1Ransomware...nu.zip
windows10-1703-x64
1Ransomware...ap.zip
windows10-1703-x64
1Ransomware...ya.zip
windows10-1703-x64
1Ransomware...DME.md
windows10-1703-x64
3Ransomware...nt.zip
windows10-1703-x64
1Ransomware...ot.zip
windows10-1703-x64
1Ransomware...ex.zip
windows10-1703-x64
1Ransomware...na.zip
windows10-1703-x64
1Ransomware...pt.zip
windows10-1703-x64
1Ransomware...os.zip
windows10-1703-x64
1Ransomware..._0.zip
windows10-1703-x64
1Ransomware...na.zip
windows10-1703-x64
1Ransomware...ry.zip
windows10-1703-x64
1Ransomware...us.zip
windows10-1703-x64
1Ransomware...re.png
windows10-1703-x64
3Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
26-02-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-Samples-main.zip
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Ransomware-Samples-main/Cerber/Ransomware.Cerber.zip
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
cerber.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
Ransomware-Samples-main/Cryptowall/Ransomware.Cryptowall.zip
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
cryptowall.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Ransomware-Samples-main/Jigsaw/Ransomware.Jigsaw.zip
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
jigsaw.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Ransomware-Samples-main/LICENSE
Resource
win10-20240214-en
Behavioral task
behavioral9
Sample
Ransomware-Samples-main/Locky/Ransomware.Locky.zip
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
Locky.exe
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
Ransomware-Samples-main/Mamba/Ransomware.Mamba.zip
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
Ransomware-Samples-main/Matsnu/Ransomware.Matsnu.zip
Resource
win10-20240221-en
Behavioral task
behavioral13
Sample
Ransomware-Samples-main/Petrwrap/Ransomware.Petrwrap.zip
Resource
win10-20240221-en
Behavioral task
behavioral14
Sample
Ransomware-Samples-main/Petya/Ransomware.Petya.zip
Resource
win10-20240214-en
Behavioral task
behavioral15
Sample
Ransomware-Samples-main/README.md
Resource
win10-20240221-en
Behavioral task
behavioral16
Sample
Ransomware-Samples-main/Radamant/Ransomware.Radamant.zip
Resource
win10-20240221-en
Behavioral task
behavioral17
Sample
Ransomware-Samples-main/RedBoot/Ransomware.RedBoot.zip
Resource
win10-20240221-en
Behavioral task
behavioral18
Sample
Ransomware-Samples-main/Rex/Ransomware.Rex.zip
Resource
win10-20240221-en
Behavioral task
behavioral19
Sample
Ransomware-Samples-main/Satana/Ransomware.Satana.zip
Resource
win10-20240221-en
Behavioral task
behavioral20
Sample
Ransomware-Samples-main/TeslaCrypt/Ransomware.TeslaCrypt.zip
Resource
win10-20240221-en
Behavioral task
behavioral21
Sample
Ransomware-Samples-main/Thanos/Ransomware.Thanos.zip
Resource
win10-20240221-en
Behavioral task
behavioral22
Sample
Ransomware-Samples-main/Unnamed_0/Ransomware.Unnamed_0.zip
Resource
win10-20240221-en
Behavioral task
behavioral23
Sample
Ransomware-Samples-main/Vipasana/Ransomware.Vipasana.zip
Resource
win10-20240221-en
Behavioral task
behavioral24
Sample
Ransomware-Samples-main/WannaCry/Ransomware.WannaCry.zip
Resource
win10-20240221-en
Behavioral task
behavioral25
Sample
Ransomware-Samples-main/WannaCry_Plus/Ransomware.WannaCry_Plus.zip
Resource
win10-20240214-en
Behavioral task
behavioral26
Sample
Ransomware-Samples-main/ransomware.png
Resource
win10-20240221-en
General
-
Target
Ransomware-Samples-main/README.md
-
Size
549B
-
MD5
ec3725f86203d73125aa3070816bb4a3
-
SHA1
4ebfd463e20656581f328d21ca7226d46c46da88
-
SHA256
1e54544721a7c12cdc7e79e4212fc116f6f7b71cdc7a2b51ae142ab69e8784bc
-
SHA512
fee577aec39892858d13e26f862354755467d54137a289cf353f8a47512066a1a0be2dd575e2608422745c2a52812d5d80ce145dc41c900eabb46b154f5a96d5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1531961169-1615826105-2188682873-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1531961169-1615826105-2188682873-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Ransomware-Samples-main\README.md1⤵
- Modifies registry class
PID:2864
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2812