General
-
Target
Fat32Formatter.exe
-
Size
276KB
-
Sample
210126-tz8gsy7b9s
-
MD5
57bfa19c46f1b511836845dc3cf660f3
-
SHA1
a90e180b514f4cdd8a5db72b4d65c42c1fb1e389
-
SHA256
e85e974255245ba41d391acc207908eeddb5ec95285e5375496a89617c5fb843
-
SHA512
f3dce6d32e009000618c3f3dc0939e1bca21ad4bf3a1ae46a74fafcff54884d07be751dad610790db3e92c116a5878f76a8c7b5aaae892fef702ca912239d48a
Static task
static1
Behavioral task
behavioral1
Sample
Fat32Formatter.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Fat32Formatter.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
Fat32Formatter.exe
-
Size
276KB
-
MD5
57bfa19c46f1b511836845dc3cf660f3
-
SHA1
a90e180b514f4cdd8a5db72b4d65c42c1fb1e389
-
SHA256
e85e974255245ba41d391acc207908eeddb5ec95285e5375496a89617c5fb843
-
SHA512
f3dce6d32e009000618c3f3dc0939e1bca21ad4bf3a1ae46a74fafcff54884d07be751dad610790db3e92c116a5878f76a8c7b5aaae892fef702ca912239d48a
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetThreadContext
-