Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
-
Size
192KB
-
MD5
59440276b249b38e5ad536f4a3ca922e
-
SHA1
db67605a431ee34e7c9f901c90eaa57b4505b7ba
-
SHA256
e62543f0558ee275d799b6f9d9369b442a300814b7c147eac65d639476910eb3
-
SHA512
a3bd20139e61a6dbcde863bf39f69bb3b19293174ea63e5eb2edeb3f1e317629f85fe1fe1d2088b50b6ef6294806e3ec886c5b6d952ba985f107fdfbf364435a
-
SSDEEP
3072:q75DzyLgv8vT6nRc24odbkDXFwzIc3jiptvwF:mDjv8v44o+X3pWF
Malware Config
Extracted
C:\Users\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Deathransom family
-
Renames multiple (130) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 23 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Downloads\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Desktop\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Links\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Music\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Pictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Videos\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Documents\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Searches\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Libraries\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Videos\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Documents\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Music\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4764 3236 WerFault.exe 79 5084 3236 WerFault.exe 79 3920 3236 WerFault.exe 79 4944 3236 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe"C:\Users\Admin\AppData\Local\Temp\f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 7082⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 7762⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10402⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 11082⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3236 -ip 32361⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3236 -ip 32361⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3236 -ip 32361⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3236 -ip 32361⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59ec44b42c6e6f1b0f46cf86c00a737f7
SHA112234609099a80e2ad4c119bca3443681e305994
SHA256935314105ceef28537308028e3810138aadb3368c6316acf0d51e9a5c85e477c
SHA5124bd18ca38851eeef521738e02f2791eaccf1ae97bf5b772d811e1ff13c4275c20fdc34302b4256b4d8ef9f441ff6a02d8cd60fd5994ce920951dcc1bddb97bc4