Resubmissions
01-03-2024 20:38
240301-ze5pesdb79 301-03-2024 20:03
240301-ysybtsce5x 301-03-2024 18:44
240301-xdmfcabg67 301-03-2024 17:56
240301-wjhhxabb92 10Analysis
-
max time kernel
497s -
max time network
1173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2024 20:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Ransomware-Samples-main.zip
Resource
win10v2004-20240226-en
2 signatures
1200 seconds
General
-
Target
Ransomware-Samples-main.zip
-
Size
15.1MB
-
MD5
e88a0140466c45348c7b482bb3e103df
-
SHA1
c59741da45f77ed2350c72055c7b3d96afd4bfc1
-
SHA256
bab1853454ca6fdd3acd471254101db1b805b601e309a49ec7b4b1fbcfc47ad7
-
SHA512
2dc9682f4fb6ea520acc505bdbe7671ab7251bf9abd25a5275f0c543a6157d7fa5325b9dce6245e035641ab831d646f0e14f6649f9464f5e97431ab1bf7da431
-
SSDEEP
393216:+8HaL/eOo2nfFSrjIMVePFmu/GyBSib+JYSWTmZ:LHayONnnBNmkPbDSWm
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2240 7zG.exe Token: 35 2240 7zG.exe Token: SeSecurityPrivilege 2240 7zG.exe Token: SeSecurityPrivilege 2240 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 7zG.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Ransomware-Samples-main.zip1⤵PID:2868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1476
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Ransomware-Samples-main\" -spe -an -ai#7zMap5215:126:7zEvent242381⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2240