Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe
Resource
win10v2004-20240508-en
General
-
Target
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe
-
Size
55KB
-
MD5
a35596ed0bfb34de4e512a3225f8300a
-
SHA1
aeb09e894736cbb41e934f83cca0247fe89d8a19
-
SHA256
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1
-
SHA512
e70eccbbe84f933a567b000fceba9666f4537489de0ed21eb3bdaf06cfb61b618be042d566969100907f06ea68aa2da1b84029d94c73f971ea35af9de968e3de
-
SSDEEP
1536:gZVYb2bbBisyEcPC00h7sBvvKk+jTc7+T8l7RJV62CzVDL+oWB27evMCUQ:EV+GiVEc6RsMJQ
Malware Config
Extracted
C:\Users\Admin\3D Objects\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Renames multiple (188) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 25 IoCs
Processes:
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exedescription ioc Process File opened for modification C:\Users\Public\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Music\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Music\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Videos\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Links\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Public\Documents\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exedescription ioc Process File opened (read-only) \??\F: 7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe"C:\Users\Admin\AppData\Local\Temp\7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
PID:3912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4196,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bbea011b3a3d6d4991f3fbbf977cae5e
SHA151e2e904455890d5c4583acb1a38c1d075b2ad31
SHA256fc795de3cd79a4f86ec085d8315f7b42e5a26f3f0efdfd15af9befad2ca3845c
SHA512b86f4e6a9e91b6b435adbf71d189b7a55852b560e9767cf57da2ff6ac073249e9b1ebfbd87824703755790ebbb837557e13220af4ed36ba52ecb285740c95641