Overview
overview
10Static
static
3Ransomware-master.zip
windows7-x64
3Ransomware-master.zip
windows10-2004-x64
1Ransomware...ICENSE
windows7-x64
1Ransomware...ICENSE
windows10-2004-x64
1Ransomware...DME.md
windows7-x64
3Ransomware...DME.md
windows10-2004-x64
3Ransomware...omware
windows7-x64
1Ransomware...omware
windows10-2004-x64
1Ransomware...er.zip
windows7-x64
1Ransomware...er.zip
windows10-2004-x64
10cerber.exe
windows7-x64
10cerber.exe
windows10-2004-x64
10Ransomware...ll.zip
windows7-x64
1Ransomware...ll.zip
windows10-2004-x64
1cryptowall.exe
windows7-x64
9cryptowall.exe
windows10-2004-x64
3Ransomware...aw.zip
windows7-x64
1Ransomware...aw.zip
windows10-2004-x64
1jigsaw.exe
windows7-x64
10jigsaw.exe
windows10-2004-x64
10Ransomware...ky.zip
windows7-x64
1Ransomware...ky.zip
windows10-2004-x64
1Locky.exe
windows7-x64
10Locky.exe
windows10-2004-x64
10Ransomware...ba.zip
windows7-x64
1Ransomware...ba.zip
windows10-2004-x64
1131.exe
windows7-x64
1131.exe
windows10-2004-x64
3Ransomware...nu.zip
windows7-x64
1Ransomware...nu.zip
windows10-2004-x64
1Matsnu-MBR...3 .exe
windows7-x64
7Matsnu-MBR...3 .exe
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-master.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ransomware-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ransomware-master/LICENSE
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Ransomware-master/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ransomware-master/README.md
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ransomware-master/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ransomware-master/Ransomware
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ransomware-master/Ransomware
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Ransomware-master/etc/Ransomware.Cerber.zip
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Ransomware-master/etc/Ransomware.Cerber.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cerber.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
cerber.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ransomware-master/etc/Ransomware.Cryptowall.zip
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ransomware-master/etc/Ransomware.Cryptowall.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cryptowall.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cryptowall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Ransomware-master/etc/Ransomware.Jigsaw.zip
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Ransomware-master/etc/Ransomware.Jigsaw.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
jigsaw.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
jigsaw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Ransomware-master/etc/Ransomware.Locky.zip
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Ransomware-master/etc/Ransomware.Locky.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Locky.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Locky.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Ransomware-master/etc/Ransomware.Mamba.zip
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Ransomware-master/etc/Ransomware.Mamba.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
131.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
131.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Ransomware-master/etc/Ransomware.Matsnu.zip
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Ransomware-master/etc/Ransomware.Matsnu.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win10v2004-20241007-en
General
-
Target
Ransomware-master.zip
-
Size
12.9MB
-
MD5
255ffabf0788a28c52889e9f9675c9dc
-
SHA1
4c61f9e16df1705db48ee91ec1a2ab3d84e2f107
-
SHA256
3e2ba9a25e9891c6dcb75ad73c1262d523e09f0eb3d095ede9ea9d11f42ebc28
-
SHA512
ccfbf169a47f7bcb653fa04b0b0b10762a594a703eae14f56bb6e0bb2e3ab0b7ee4b3a2c14ade7ee6509fcabfed1a5a4da2e7bf035295e797eba8140079eef3d
-
SSDEEP
393216:CMa/Yi2nfFSrjISVemu/GyBSFb+JYSWTmZ:CMaUnnlmk+bDSWs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7zFM.exepid Process 2192 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exerundll32.exepid Process 2192 7zFM.exe 2660 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 2192 7zFM.exe Token: 35 2192 7zFM.exe Token: SeSecurityPrivilege 2192 7zFM.exe Token: SeSecurityPrivilege 2192 7zFM.exe Token: SeSecurityPrivilege 2192 7zFM.exe Token: SeSecurityPrivilege 2192 7zFM.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
7zFM.exepid Process 2192 7zFM.exe 2192 7zFM.exe 2192 7zFM.exe 2192 7zFM.exe 2192 7zFM.exe 2192 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7zFM.exedescription pid Process procid_target PID 2192 wrote to memory of 2660 2192 7zFM.exe 30 PID 2192 wrote to memory of 2660 2192 7zFM.exe 30 PID 2192 wrote to memory of 2660 2192 7zFM.exe 30 PID 2192 wrote to memory of 1952 2192 7zFM.exe 31 PID 2192 wrote to memory of 1952 2192 7zFM.exe 31 PID 2192 wrote to memory of 1952 2192 7zFM.exe 31
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Ransomware-master.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zO098781D6\Ransomware2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2660
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zO09802B38\warna.py2⤵
- Modifies registry class
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
650B
MD519522678240a7e6d1e5531ed275b6a64
SHA101653b2ca19505c7e9a7972df2e7d6784cc627b6
SHA2566986bfb870797a56611749719d8aabfdfcf272392765692a15c065c42f88c3cf
SHA5128f2d1efd81a4bafa8d3a50fce740514469a7ccdb2d68f908b9e86d1714ca605525e75a5f0f5ac9dd798299db75810bdf0d06f88e0103609b4d0843ff12d24292
-
Filesize
25KB
MD5d54b447020c50a74fefeeacd7be46733
SHA196f347b8545bde22d52e36d95779dceff0401697
SHA256d1ebf588dbbcca6b21d20ef37d368d48bf6d7a9cdb6636245010fe87e4533f70
SHA512415825c912210b5115dab8f2388631120eab7ee98bd7cba04705b700d10e325e1b42b6f8dbe5ff37a3b411a203ae436915d4dd6b655750f354817382d31f0954