Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 15:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Ransomware.exe
Resource
win7-20240903-en
11 signatures
150 seconds
General
-
Target
Ransomware.exe
-
Size
226KB
-
MD5
d84b539729ac3e998beb543a31a698cc
-
SHA1
9fd3145c32b13a99cc9bb90f4a365615504eafe1
-
SHA256
78bd79e04587e7cb4e0822ef430badd710aa1f10e5e227a6226ca17cca8a8c27
-
SHA512
1af2784a2d71ddaf9b110b8e70f2fc3e96e8f2da08c02bcd6dd7e74416b8695794f0a5890cb41b3dee411a2d3f716682afe7fd10740a79a70c139fb79f00c15e
-
SSDEEP
3072:BQqYoq/mfae47e4frk8feIy4yLahVxjrRKzHA86mgsFlI3ToCku5rRspB:4/SI7ffrzfs4yLajx888XDI3T/kAE
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" Ransomware.exe -
Disables Task Manager via registry modification
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\Wallpaper Ransomware.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\System32\CyptedReady.ini Ransomware.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2632 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 840 Ransomware.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 840 Ransomware.exe Token: SeDebugPrivilege 2632 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 Ransomware.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2632 840 Ransomware.exe 31 PID 840 wrote to memory of 2632 840 Ransomware.exe 31 PID 840 wrote to memory of 2632 840 Ransomware.exe 31 PID 840 wrote to memory of 2632 840 Ransomware.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"1⤵
- Modifies WinLogon for persistence
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2632
-