Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe
Resource
win10v2004-20240508-en
General
-
Target
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe
-
Size
55KB
-
MD5
a35596ed0bfb34de4e512a3225f8300a
-
SHA1
aeb09e894736cbb41e934f83cca0247fe89d8a19
-
SHA256
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1
-
SHA512
e70eccbbe84f933a567b000fceba9666f4537489de0ed21eb3bdaf06cfb61b618be042d566969100907f06ea68aa2da1b84029d94c73f971ea35af9de968e3de
-
SSDEEP
1536:gZVYb2bbBisyEcPC00h7sBvvKk+jTc7+T8l7RJV62CzVDL+oWB27evMCUQ:EV+GiVEc6RsMJQ
Malware Config
Extracted
C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Renames multiple (174) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Videos\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Links\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Music\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Music\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Documents\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50ab20f734dcfc7c60d1ee9e94bb683dd
SHA1115d23bec90d73c69c00a7cc979238d7a9a938aa
SHA2562985a84a2cb98acfecb596cc3795ef22cb75932578098c06be07eb12ee55219b
SHA5123ad14fd15a515ce69cba73a1b4ece346f9ac7d0cd645f58c649ce54fd149f24842ba684a2fdf248ffaaffed9189fac880dcb6ff18ab99fb396dde1d884b43d0b