Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 21:58
Behavioral task
behavioral1
Sample
1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe
-
Size
5.7MB
-
MD5
e3204b2e61223989b1562f5dee40eee0
-
SHA1
7bd50a3b0e3f9b4a543f750869ca3ee29b4798e1
-
SHA256
1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64
-
SHA512
19df0eb4c803e6eeb41abb1fb425f4d9cd6e4262aaeb8bbf7eb959a30f3db2533fd6aed13e055a9781371e9de37de4212d80a32862798368e5dd798763012bc4
-
SSDEEP
98304:Um4trkO7w2JiJSBdUIVLoEricI7vwE77YFHIRM78PyYgh9TU8NVDa1zyWvq:GZRBhLmwbMM78qtYgVO9yj
Malware Config
Extracted
C:\Users\Admin\3D Objects\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Deathransom family
-
Renames multiple (171) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/memory/392-4-0x00000000006F0000-0x0000000000CAC000-memory.dmp vmprotect behavioral1/memory/392-6-0x00000000006F0000-0x0000000000CAC000-memory.dmp vmprotect behavioral1/memory/392-104-0x00000000006F0000-0x0000000000CAC000-memory.dmp vmprotect -
Drops desktop.ini file(s) 23 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Documents\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Music\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Videos\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Links\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 392 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 392 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe 392 1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe"C:\Users\Admin\AppData\Local\Temp\1ee39f6cd500940ad97c444778dc717361e01ce5579a28d761aedae86e85af64.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51565f4efa19ff58535601c06203345d8
SHA1f5679711b309efef4125f285cb9c2f0dab90cf38
SHA25679e6a04df9ec1eee0ca26756cad7fc6d76e155b753318e1cdd55c60c0845d21c
SHA512df77a2c9ab3600349528f30ea76b1c7339ca224637a9b37ed79597f3ae110cae4c34fbe3fc5e866c757f77ef8cbc4c1af3bf1a2af274585850621527cd23d1e7