General
-
Target
88ae30e10e2db871b9f5f986837c184a386ed58805fb066effed90f4619ec46e.sample
-
Size
654KB
-
Sample
210726-yhv7efd9dn
-
MD5
2452df8493c85994e7fe0f42e664999e
-
SHA1
0ed37c982134aa703837f38bea0549e70c29bccb
-
SHA256
88ae30e10e2db871b9f5f986837c184a386ed58805fb066effed90f4619ec46e
-
SHA512
132ff8871e8fac09512760766c8c4dd25ee9bfd695885354e64f02dd6d3615f621f34c3e410b5ac981181ca7635608367b72e60d5422f96d1d907ed926cb80bb
Static task
static1
Behavioral task
behavioral1
Sample
88ae30e10e2db871b9f5f986837c184a386ed58805fb066effed90f4619ec46e.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
88ae30e10e2db871b9f5f986837c184a386ed58805fb066effed90f4619ec46e.sample.exe
Resource
win10v20210408
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-tixksrn.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-tixksrn.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Extracted
C:\ProgramData\sctpnha.html
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-dmzevle.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Targets
-
-
Target
88ae30e10e2db871b9f5f986837c184a386ed58805fb066effed90f4619ec46e.sample
-
Size
654KB
-
MD5
2452df8493c85994e7fe0f42e664999e
-
SHA1
0ed37c982134aa703837f38bea0549e70c29bccb
-
SHA256
88ae30e10e2db871b9f5f986837c184a386ed58805fb066effed90f4619ec46e
-
SHA512
132ff8871e8fac09512760766c8c4dd25ee9bfd695885354e64f02dd6d3615f621f34c3e410b5ac981181ca7635608367b72e60d5422f96d1d907ed926cb80bb
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-