Analysis

  • max time kernel
    187s
  • max time network
    161s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/03/2025, 21:52

General

  • Target

    Ransomware.rar

  • Size

    2.0MB

  • MD5

    be9234c7da40177c8ac943cfa675a9ce

  • SHA1

    debe723432e936459324cd3a3dd36a79a69b6389

  • SHA256

    73ab84178a6cddd1589f0d9ba8634dbcbd3dec886ed280a836d302a023a9fc9f

  • SHA512

    76189183d32c041a7c23191ea74b8bc22fe94d04808e11b9943b111fb592325fda0784e8a2832d6dfc980e947b07a02ad8a3934380f18de4cfd7fb0b6dbe554c

  • SSDEEP

    49152:OolgsK4DPhW3GaMrnPO1+WCanyw9uJb49xiSXRzxklk:OolDK4DYWaCOiatuSvh9klk

Malware Config

Signatures

  • CryptoLocker

    Ransomware family with multiple variants.

  • Cryptolocker family
  • Executes dropped EXE 3 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Ransomware.rar"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5316
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:4476
  • C:\Windows\System32\cmd.exe
    "C:\Windows\System32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\Desktop\Ransomware.exe
      Ransomware.exe
      2⤵
      • Executes dropped EXE
      PID:5188
    • C:\Users\Admin\Desktop\Ransomware.exe
      Ransomware.exe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
      • C:\Windows\System32\Wbem\wmic.exe
        wmic cpu get name
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:6048
      • C:\Windows\System32\Wbem\wmic.exe
        wmic path win32_VideoController get name
        3⤵
        • Detects videocard installed
        PID:1156
      • C:\Windows\System32\Wbem\wmic.exe
        wmic memorychip get capacity
        3⤵
          PID:1996
        • C:\Windows\System32\Wbem\wmic.exe
          wmic logicaldisk where drivetype=3 get size,freespace
          3⤵
            PID:4080
          • C:\Windows\system32\cmd.exe
            cmd /c ver
            3⤵
              PID:3932
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-MpComputerStatus
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4156
          • C:\Users\Admin\Desktop\Ransomware.exe
            Ransomware.exe
            2⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Windows\System32\Wbem\wmic.exe
              wmic csproduct get uuid
              3⤵
                PID:3956
              • C:\Windows\System32\Wbem\wmic.exe
                wmic cpu get name
                3⤵
                  PID:5820
                • C:\Windows\System32\Wbem\wmic.exe
                  wmic path win32_VideoController get name
                  3⤵
                  • Detects videocard installed
                  PID:348
                • C:\Windows\System32\Wbem\wmic.exe
                  wmic memorychip get capacity
                  3⤵
                    PID:772
                  • C:\Windows\System32\Wbem\wmic.exe
                    wmic logicaldisk where drivetype=3 get size,freespace
                    3⤵
                      PID:248
                    • C:\Windows\system32\cmd.exe
                      cmd /c ver
                      3⤵
                        PID:1728
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell Get-MpComputerStatus
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2800
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                    1⤵
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:2848
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:3572

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      627073ee3ca9676911bee35548eff2b8

                      SHA1

                      4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                      SHA256

                      85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                      SHA512

                      3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      1a9fa92a4f2e2ec9e244d43a6a4f8fb9

                      SHA1

                      9910190edfaccece1dfcc1d92e357772f5dae8f7

                      SHA256

                      0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

                      SHA512

                      5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\69227ffe-f57e-4f04-ba56-f414ea8e9a0c.down_data

                      Filesize

                      555KB

                      MD5

                      5683c0028832cae4ef93ca39c8ac5029

                      SHA1

                      248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                      SHA256

                      855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                      SHA512

                      aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                      Filesize

                      23KB

                      MD5

                      e4502e12eddb65147ccb0c39021d5c54

                      SHA1

                      e0c340c26168e569ed1b09955e386922b9c76fc0

                      SHA256

                      ca1d08100dade9a95b1f93a37ac07587d9dca6866a8cb87436aadd5d29c86d6c

                      SHA512

                      9619f8745eaa0f18f6372258d3e7e068c0347fb1effa578bff7d173d6ee49507610316036c712834f8e336a01e95ba8d6ba8270ae1a439481877cc37b51405fd

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m35fsdre.5jp.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\Desktop\DECRYPT_INSTRUCTIONS.txt

                      Filesize

                      79B

                      MD5

                      ed0a365f7c573e01e32438e174787b49

                      SHA1

                      1efadd3b97535dda8dcf05b7a0c0e7e98280ccc0

                      SHA256

                      faadea8971c2dfae82cb9c3a7daf87a854bc7e066ce7fec05e18518aa2b90f81

                      SHA512

                      951cb87cbeb0d44686525769fa9e8cc12fbb752d018e19efe211a56c9edef255844e87c134d04f778233602c973548a89e477d3f0e506562a8bba59228b0b706

                    • C:\Users\Admin\Desktop\Ransomware.exe

                      Filesize

                      5.8MB

                      MD5

                      4d9821dbd232afd7f1435b00604f3627

                      SHA1

                      42982f1ed1462a45ac3c255e804b589d09a492e8

                      SHA256

                      ebe0048a9c5ba9f0fcc032c7e7c2c5f70a30aefccbfa96820ebd6d53e912f6e1

                      SHA512

                      5bcd5ccffd259b132924146860a49a46465a41db67e4f16ab0284cce8928cce3e93f5269e08096f92c2d6de6a3c32b2f071f05667f1f424e2db6dea1af8b5329

                    • memory/4156-28-0x0000022A2F180000-0x0000022A2F1A2000-memory.dmp

                      Filesize

                      136KB