Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 18:21
Behavioral task
behavioral1
Sample
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe
Resource
win10v2004-20240412-en
General
-
Target
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe
-
Size
35KB
-
MD5
70e4b9b7a83473687e5784489d556c87
-
SHA1
1f594456d88591d3a88e1cdd4e93c6c4e59b746c
-
SHA256
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6
-
SHA512
89878d4a72521a9742fe671979065ea210f7c78975040c28c0c5ec4733d90680d71b45bfe5582baf6e4bc62850777b1b2a68ad8e2dcaf95edc19544622855d2c
-
SSDEEP
768:+8SQb5hyBBIqa1L4SvEUfBNEUuQjreZBLjpKgk:+8SkLq2VrM8EUuoyjp
Malware Config
Signatures
-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Renames multiple (214) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1888 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/3036-0-0x0000000000BF0000-0x0000000000C05000-memory.dmp upx behavioral1/memory/3036-508-0x0000000000BF0000-0x0000000000C05000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 328 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.execmd.exedescription pid process target process PID 3036 wrote to memory of 1888 3036 5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe cmd.exe PID 3036 wrote to memory of 1888 3036 5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe cmd.exe PID 3036 wrote to memory of 1888 3036 5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe cmd.exe PID 3036 wrote to memory of 1888 3036 5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe cmd.exe PID 1888 wrote to memory of 328 1888 cmd.exe timeout.exe PID 1888 wrote to memory of 328 1888 cmd.exe timeout.exe PID 1888 wrote to memory of 328 1888 cmd.exe timeout.exe PID 1888 wrote to memory of 328 1888 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe"C:\Users\Admin\AppData\Local\Temp\5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe" /s /f /q2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:328
-
-