Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
DeathRansom_1.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
DeathRansom_1.exe
Resource
win10v2004-20240704-en
General
-
Target
DeathRansom_1.exe
-
Size
55KB
-
MD5
a35596ed0bfb34de4e512a3225f8300a
-
SHA1
aeb09e894736cbb41e934f83cca0247fe89d8a19
-
SHA256
7c2dbad516d18d2c1c21ecc5792bc232f7b34dadc1bc19e967190d79174131d1
-
SHA512
e70eccbbe84f933a567b000fceba9666f4537489de0ed21eb3bdaf06cfb61b618be042d566969100907f06ea68aa2da1b84029d94c73f971ea35af9de968e3de
-
SSDEEP
1536:gZVYb2bbBisyEcPC00h7sBvvKk+jTc7+T8l7RJV62CzVDL+oWB27evMCUQ:EV+GiVEc6RsMJQ
Malware Config
Extracted
C:\PerfLogs\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Renames multiple (186) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Documents\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Music\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Links\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Videos\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Pictures\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Music\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Videos\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Downloads\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Libraries\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Admin\Searches\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Documents\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Desktop\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini DeathRansom_1.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini DeathRansom_1.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: DeathRansom_1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 592 NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\DeathRansom_1.exe"C:\Users\Admin\AppData\Local\Temp\DeathRansom_1.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
PID:2856
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\read_me.txt1⤵
- Opens file in notepad (likely ransom note)
PID:592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51404cc701eb347e9826738466ddd4449
SHA1799b4b32f655de865de9abf5a1e0d3dd5a5f6bdf
SHA256c25463de2c1a20a223cb345d28d3b67249679413c4f123f1d756257c34b943a3
SHA512826562ae27b5784bef833890a33bbe56763578f999a2c8d5f50e7744ff14c2b8db119892db3a4c221a0763b7b8ecc9f5c19f984f45d61e7c2463709b046096a5