General
-
Target
1e406ec30ce6ff9998b5b1ad72232713832889e32cc890c807386831ee8dea9f
-
Size
662KB
-
Sample
220201-s98w1ahacn
-
MD5
9148e0f611793ed63f4348501b3f3f9d
-
SHA1
47b8bf8860f7c5d4c25cad24de6ab6cf525fa74f
-
SHA256
1e406ec30ce6ff9998b5b1ad72232713832889e32cc890c807386831ee8dea9f
-
SHA512
4f78d1dbbf70c044e86d979d646df26d4868297ffe7d59e2769bbd291c9b41a344e1d97b65bfbf74b012b39aa7cc41e0cd19003ca04e05a6572f7185023386ad
Static task
static1
Behavioral task
behavioral1
Sample
1e406ec30ce6ff9998b5b1ad72232713832889e32cc890c807386831ee8dea9f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1e406ec30ce6ff9998b5b1ad72232713832889e32cc890c807386831ee8dea9f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Targets
-
-
Target
1e406ec30ce6ff9998b5b1ad72232713832889e32cc890c807386831ee8dea9f
-
Size
662KB
-
MD5
9148e0f611793ed63f4348501b3f3f9d
-
SHA1
47b8bf8860f7c5d4c25cad24de6ab6cf525fa74f
-
SHA256
1e406ec30ce6ff9998b5b1ad72232713832889e32cc890c807386831ee8dea9f
-
SHA512
4f78d1dbbf70c044e86d979d646df26d4868297ffe7d59e2769bbd291c9b41a344e1d97b65bfbf74b012b39aa7cc41e0cd19003ca04e05a6572f7185023386ad
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets service image path in registry
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-