General
-
Target
f7f3cfe5184edcc3784d81420a6cd9d938b2d60d9d549f2c758dad8aa999282b
-
Size
55KB
-
Sample
220211-g5l1wsddek
-
MD5
ad93d71be8ff2614c1344ff0f4f7ff66
-
SHA1
69709130060b6dfb33173320186eccfb74e30f85
-
SHA256
f7f3cfe5184edcc3784d81420a6cd9d938b2d60d9d549f2c758dad8aa999282b
-
SHA512
64b086a2c8cafdcd9daa06c0b3eaf3209fbacf69292dc98edaaedde8ad2ea7a34a30fb2131647833a01557020586d3128a2a19cdb374542445c482b07bdc7d1d
Static task
static1
Behavioral task
behavioral1
Sample
f7f3cfe5184edcc3784d81420a6cd9d938b2d60d9d549f2c758dad8aa999282b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f7f3cfe5184edcc3784d81420a6cd9d938b2d60d9d549f2c758dad8aa999282b.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
class="mark">[email protected]</span>.</br>
class="mark">[email protected]</span>.</br>
class="mark">[email protected]</span>
class="mark">[email protected]</span></li>
Extracted
C:\how_to_back_files.html
class="mark">[email protected]</span>.</br>
class="mark">[email protected]</span>.</br>
class="mark">[email protected]</span>
class="mark">[email protected]</span></li>
Targets
-
-
Target
f7f3cfe5184edcc3784d81420a6cd9d938b2d60d9d549f2c758dad8aa999282b
-
Size
55KB
-
MD5
ad93d71be8ff2614c1344ff0f4f7ff66
-
SHA1
69709130060b6dfb33173320186eccfb74e30f85
-
SHA256
f7f3cfe5184edcc3784d81420a6cd9d938b2d60d9d549f2c758dad8aa999282b
-
SHA512
64b086a2c8cafdcd9daa06c0b3eaf3209fbacf69292dc98edaaedde8ad2ea7a34a30fb2131647833a01557020586d3128a2a19cdb374542445c482b07bdc7d1d
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-