Overview
overview
10Static
static
5order.exe
windows7-x64
10UGH CRYSIS RANSOm.exe
windows7-x64
10crusususus...is.exe
windows7-x64
6crysisisis.exe
windows7-x64
9encrypt da ct.exe
windows7-x64
10i dunno i ...om.exe
windows7-x64
10i no crysi...it.exe
windows7-x64
10im gonna cry sis.exe
windows7-x64
10omg its fu...IS.exe
windows7-x64
10why crysis...as.exe
windows7-x64
10General
-
Target
Desktop.zip
-
Size
7.2MB
-
Sample
241104-xky3qavflf
-
MD5
f07a13d08d3955db2ed1395dbeb750f5
-
SHA1
d1f0e600fc007ee5381674e4f1fa090607e0814b
-
SHA256
503b1aff23f00a7a668cc8213199a78ac5a66704f375f198b9d41514753cefc8
-
SHA512
972847ae6620d9702b4447e5765d700c18dd9fe6e42ed8e9d4547015c442a64b82657e5d29090da19187e7dc56c33fd0df2ffa1a70265317d62bfea51b408136
-
SSDEEP
196608:Q3f35VoPxurjsLURhw35ivcLhRyQrCz1977KyoK8:QQPwrjskwJi0L7pWz1972yo1
Behavioral task
behavioral1
Sample
order.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UGH CRYSIS RANSOm.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
crususususussu crysis.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
crysisisis.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
encrypt da ct.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
i dunno i think its crysis ransom.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
i no crysis dis shit.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
im gonna cry sis.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
omg its fucking CRYSIS.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
why crysis go raas.exe
Resource
win7-20240729-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
http://zombietry4o3nzeh.onion/?ticket=6aWH6i3Gxp3cXPpqzl_8EA6CEFF
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
netwire
fdghfghdfghjhgjkgfgjh234569.ru:6974
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
a2nw
-
lock_executable
false
-
mutex
NrPiWfVe
-
offline_keylogger
false
-
password
rdfs34df32sdf
-
registry_autorun
false
-
use_mutex
true
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
order.exe
-
Size
970KB
-
MD5
8951ea556fc0f09d34d55ae9d610ccea
-
SHA1
7de8815e4af9fa2ef6514c70ea53ecc4d0bbd838
-
SHA256
a12897e495ca61d13e95bbfd9015357debc8ce95561ffcc91d06929211763cdb
-
SHA512
9d1138068076830bb4eb2b2706f257321f4ac4cd37d28ee02325baa832703f570cc71f4715a074a826983af2370dac6077ddc6f3e66383cc741797150836bd4c
-
SSDEEP
24576:rFrCGXjsiUJU1wqGf5AjuQ5O3h3fMtb2Kv1bH:VnuJUCz7Mtb2e1bH
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
UGH CRYSIS RANSOm
-
Size
92KB
-
MD5
7bf2f1187fb0f74893de4d4f54591af4
-
SHA1
42446f82700f819901a2e8b302c7eb32e1f99d5a
-
SHA256
482e5b77bf6c0c2953e2e8a456a3a072a3f9d5cb35e822e493d062d2372a1fc0
-
SHA512
f77d1ff98988a9d319a2bb17511a002f437029de422856f8f519376a70316e10a9594dccd6a5fed5f7fdf8d65e61d0bb5f6385b6a660b28b6c13958e6b24a814
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AO4yxgrrMjNN5Pw0Pv7i+1ZvqwaC:Qw+asqN5aW/hLU4yxgrrMjNN5Pw27XbK
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (323) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
-
-
Target
crususususussu crysis
-
Size
118KB
-
MD5
3dafd3cca1edf4b51321eb019ce0196f
-
SHA1
d6f73449c7edc104e73b694cf8ea79869ba8b6a6
-
SHA256
9a5a620bf7e1eeed874d02afa8f7d2a6bb7c51ed431346f87514cf239c0d5a17
-
SHA512
336eaa50d1fcbbe602e1878eed578e5be7e492a77d01f05075b0c64702391a12d8cd1237d9e10905999642810f36b8a01995a614899e9f9224896d403873fda1
-
SSDEEP
3072:gWk1zRZTLPwwD04+KsdH8xwkA2YYoN1dMtIyI6eqvu6u:Dk1zRJzwZrMA4tpc
Score6/10-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
-
-
Target
crysisisis
-
Size
4.3MB
-
MD5
70c00b229ef625c6823fb7e499350b65
-
SHA1
adcde6250040d3d713f770c2c9fd39c767cfc71d
-
SHA256
8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27
-
SHA512
c6bbbbfee20e00ae048edad5187a34088079b9acf7c694ecf3f3ebba8eea93be44409ad9879e2f07c7b8b49c818d9c828bc29a419101fb8ebda01e91072e46a3
-
SSDEEP
98304:1BBBJfpyobtKZ4XzeiA8m88S1AxNcYZGfgPSUBclP6SEcfX:HRfpyJeXzeIm3S1AxNccGfWKZfEcf
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
encrypt da ct
-
Size
496KB
-
MD5
d04bd9640cf05c1d8ec150b8ec3dea9d
-
SHA1
9f1d2b477e072b993144df959e46bff88885d161
-
SHA256
7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69
-
SHA512
806ccb9ab75e0b0fd41bc6d1b9de3be1e58f75a8af3db1bffbb9c1137a40e49587c6fad8eb8c1dfae89aef5b23a90e2bbadfb02ff9600557e398d67407730542
-
SSDEEP
6144:wYiWcGsEld6itHpoNu6HwcDK1668T1wGTtE2hmDnVBjrvNtwNoI:wYSEj6itHp6JHwMc6/+2oDnXe1
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (316) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
i dunno i think its crysis ransom
-
Size
382KB
-
MD5
c552a3083cae175ce2cf1b272236ee52
-
SHA1
4fbbaed1224d55a19aa8a2993ae6d567478f77cb
-
SHA256
310b24120390c6b8d7dac7cfe94259aa7bb03f75b2bea08b8c62fe78efcbe2e0
-
SHA512
40cabef46fcf76b1eb2aa510fd77c129bb1d67d0e87da273c03abb91c631545e193522dd393da8563d3654562b02d14fd991eb1ec00f8b570336f9b9da4668e5
-
SSDEEP
6144:uCdYss/E7IOEE39kr9HC/CRNkqq3S8213/jMtdH/pDhXdrAV16V0olOWyQw:ts/E8Oj39y9HC/Ab82mtdfpFxAbstlzZ
-
NetWire RAT payload
-
Netwire family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
i no crysis dis shit
-
Size
654KB
-
MD5
d02e4dc2873794442422e9e7ab984629
-
SHA1
33fe022ead73e2cab2afbd57ed5a43babb3b0833
-
SHA256
6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71
-
SHA512
ef0efac29a348e95ec370e27555ad40fccb49afc4461f2791618a7d58417064482912e39c33aaa8115ac727977067ecb1fdee25428846523541020742320c289
-
SSDEEP
12288:WLnPggwTd/e544UcwZvSJ/YGGquZGnVXt+v/9LzjERf:gMTd/ea4qZ2QGG9ZKX8v1v
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (180) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
im gonna cry sis
-
Size
390KB
-
MD5
55930ef259fa602f9bbe266a6e8dd158
-
SHA1
f54af827410eb2ad8a85538e56280a3e191a58e5
-
SHA256
eb4168396a082431fa7083533e14c6422aadba6c5ca76119cd855d40289b5aab
-
SHA512
acbba2a00e5f4f1c75128df64577623fce7d4146127a850aea8edb6949283d39487fdef30ac749ad29fcc0ed8b0f89abe4b8c1576720d5529a9556e764ba64ff
-
SSDEEP
12288:vW10ZHF+GKhI6mPGHM3ZH7KV4luGqR7MOXf1e0/V:vlHFiW3uVqo7MOP1egV
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
omg its fucking CRYSIS
-
Size
420KB
-
MD5
859553e76bcfb7c19bbf1ad1290b360c
-
SHA1
6a71def09b4b0058ca6f0b077a93c22b4eb63082
-
SHA256
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4
-
SHA512
100dc319e1082da1f4a2d779642c785a89b2e00272ee85390c4cdcaa589ed0091eacdda5fc06ac9a87ea025b4fe0be62323ba51bd34b7968d96d8859f0676d2b
-
SSDEEP
12288:YLcVB4j5CW1p3vE1eqFs5WkdsvG9iCNY5:YQVioWX/E1e59s+9iCNk
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (313) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
why crysis go raas
-
Size
867KB
-
MD5
611951ee8ab1f66bace29d81d40fdeb3
-
SHA1
7769f65c969bcc8f6e677b42fcbd9d8516117437
-
SHA256
425e4f08a31dc3c68a1a3a2518322531a4b9043ce66a683184d4d0b6e0ae6913
-
SHA512
a62c7b2b44084bc284ae5b57e27b2ef9375832871dcfb6863a78ebfb4a474457c5693a94566e2b37fab8e91f757a868a9615e6f09c15762934726c840d36113e
-
SSDEEP
12288:GDpXyEqeOf43Fg0xyNrlEyJH3Z6CkZTIvbIVssletMv8uYZzJhLttkr:jeOfExyF3sCaTIvtKF8/zJ1kr
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
2Credentials In Files
2