Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win10v2004-20250217-en
General
-
Target
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
-
Size
192KB
-
MD5
59440276b249b38e5ad536f4a3ca922e
-
SHA1
db67605a431ee34e7c9f901c90eaa57b4505b7ba
-
SHA256
e62543f0558ee275d799b6f9d9369b442a300814b7c147eac65d639476910eb3
-
SHA512
a3bd20139e61a6dbcde863bf39f69bb3b19293174ea63e5eb2edeb3f1e317629f85fe1fe1d2088b50b6ef6294806e3ec886c5b6d952ba985f107fdfbf364435a
-
SSDEEP
3072:q75DzyLgv8vT6nRc24odbkDXFwzIc3jiptvwF:mDjv8v44o+X3pWF
Malware Config
Extracted
C:\PerfLogs\Admin\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Deathransom family
-
Renames multiple (138) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 9 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Documents\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Links\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Music\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe"C:\Users\Admin\AppData\Local\Temp\f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d4c8aa2d840524a63c988799531431be
SHA1da407b44cc87e4c8e1ff8645cee00520150aba92
SHA256174eb1fd839a722e74c060a3d0bce36bbff650c931250bdff71e30a4dd1e7539
SHA5124b645d9807f7f2bb4891d01576e2faf9feeedc3c6f3c381e351e3c4a87336a28b6eebb71362f68e389fcd1769a8a3fb6242677ce774415776c1e736c7b3d4ff4