Overview
overview
10Static
static
3Ransomware-master.zip
windows7-x64
3Ransomware-master.zip
windows10-2004-x64
1Ransomware...ICENSE
windows7-x64
1Ransomware...ICENSE
windows10-2004-x64
1Ransomware...DME.md
windows7-x64
3Ransomware...DME.md
windows10-2004-x64
3Ransomware...omware
windows7-x64
1Ransomware...omware
windows10-2004-x64
1Ransomware...er.zip
windows7-x64
1Ransomware...er.zip
windows10-2004-x64
10cerber.exe
windows7-x64
10cerber.exe
windows10-2004-x64
10Ransomware...ll.zip
windows7-x64
1Ransomware...ll.zip
windows10-2004-x64
1cryptowall.exe
windows7-x64
9cryptowall.exe
windows10-2004-x64
3Ransomware...aw.zip
windows7-x64
1Ransomware...aw.zip
windows10-2004-x64
1jigsaw.exe
windows7-x64
10jigsaw.exe
windows10-2004-x64
10Ransomware...ky.zip
windows7-x64
1Ransomware...ky.zip
windows10-2004-x64
1Locky.exe
windows7-x64
10Locky.exe
windows10-2004-x64
10Ransomware...ba.zip
windows7-x64
1Ransomware...ba.zip
windows10-2004-x64
1131.exe
windows7-x64
1131.exe
windows10-2004-x64
3Ransomware...nu.zip
windows7-x64
1Ransomware...nu.zip
windows10-2004-x64
1Matsnu-MBR...3 .exe
windows7-x64
7Matsnu-MBR...3 .exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-master.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ransomware-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ransomware-master/LICENSE
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Ransomware-master/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ransomware-master/README.md
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ransomware-master/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ransomware-master/Ransomware
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ransomware-master/Ransomware
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Ransomware-master/etc/Ransomware.Cerber.zip
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Ransomware-master/etc/Ransomware.Cerber.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cerber.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
cerber.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ransomware-master/etc/Ransomware.Cryptowall.zip
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ransomware-master/etc/Ransomware.Cryptowall.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cryptowall.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cryptowall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Ransomware-master/etc/Ransomware.Jigsaw.zip
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Ransomware-master/etc/Ransomware.Jigsaw.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
jigsaw.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
jigsaw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Ransomware-master/etc/Ransomware.Locky.zip
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Ransomware-master/etc/Ransomware.Locky.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Locky.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Locky.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Ransomware-master/etc/Ransomware.Mamba.zip
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Ransomware-master/etc/Ransomware.Mamba.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
131.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
131.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Ransomware-master/etc/Ransomware.Matsnu.zip
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Ransomware-master/etc/Ransomware.Matsnu.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win10v2004-20241007-en
General
-
Target
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
-
Size
102KB
-
MD5
1b2d2a4b97c7c2727d571bbf9376f54f
-
SHA1
1fc29938ec5c209ba900247d2919069b320d33b0
-
SHA256
7634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
-
SHA512
506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0
-
SSDEEP
1536:jj+Rj1lGIXKSmE17v97yiqHGMRPtbsLW8/V2k12v1/BDxVyCfCrCAc:jjw6Sf0iqmMnb2W02v3mCf4Nc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2792 xoufpjtenv.pre 2836 xoufpjtenv.pre -
Loads dropped DLL 3 IoCs
pid Process 2240 svchost.exe 2240 svchost.exe 2792 xoufpjtenv.pre -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\knkztwev = "C:\\Users\\Admin\\AppData\\Roaming\\Mlzpryvbkst\\iwlchtwev.exe" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2340 set thread context of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2792 set thread context of 2836 2792 xoufpjtenv.pre 34 -
resource yara_rule behavioral31/memory/2060-8-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2060-13-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2060-12-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2060-11-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2060-10-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2060-4-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2060-2-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral31/memory/2836-44-0x0000000000400000-0x0000000000414000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoufpjtenv.pre Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoufpjtenv.pre -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2060 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2340 wrote to memory of 2060 2340 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2060 wrote to memory of 2240 2060 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2060 wrote to memory of 2240 2060 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2060 wrote to memory of 2240 2060 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2060 wrote to memory of 2240 2060 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2060 wrote to memory of 2240 2060 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2240 wrote to memory of 2792 2240 svchost.exe 33 PID 2240 wrote to memory of 2792 2240 svchost.exe 33 PID 2240 wrote to memory of 2792 2240 svchost.exe 33 PID 2240 wrote to memory of 2792 2240 svchost.exe 33 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2792 wrote to memory of 2836 2792 xoufpjtenv.pre 34 PID 2836 wrote to memory of 2760 2836 xoufpjtenv.pre 35 PID 2836 wrote to memory of 2760 2836 xoufpjtenv.pre 35 PID 2836 wrote to memory of 2760 2836 xoufpjtenv.pre 35 PID 2836 wrote to memory of 2760 2836 xoufpjtenv.pre 35 PID 2836 wrote to memory of 2760 2836 xoufpjtenv.pre 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\xoufpjtenv.preC:\Users\Admin\AppData\Local\Temp\xoufpjtenv.pre4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\xoufpjtenv.preC:\Users\Admin\AppData\Local\Temp\xoufpjtenv.pre5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD51b2d2a4b97c7c2727d571bbf9376f54f
SHA11fc29938ec5c209ba900247d2919069b320d33b0
SHA2567634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
SHA512506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0