General
-
Target
dd5eca1c0a35472d4cd1d40fe133a02250a4d544eb0c27bc69c5a1a940ba6d57
-
Size
53KB
-
Sample
220211-g79vqsddhj
-
MD5
599e7ece6c2232fb535831b55dccb36a
-
SHA1
af013ba3809a79151d63133824356398f19f7ede
-
SHA256
dd5eca1c0a35472d4cd1d40fe133a02250a4d544eb0c27bc69c5a1a940ba6d57
-
SHA512
77aed87a2857847b3edf6c1483c19e15fa88a08a17769ec19c78b533da2913f38cc3647bd3ffaa4bb90550fa8eb66f4289296d844aaa0e1146b621a0987387a7
Static task
static1
Behavioral task
behavioral1
Sample
dd5eca1c0a35472d4cd1d40fe133a02250a4d544eb0c27bc69c5a1a940ba6d57.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dd5eca1c0a35472d4cd1d40fe133a02250a4d544eb0c27bc69c5a1a940ba6d57.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
dd5eca1c0a35472d4cd1d40fe133a02250a4d544eb0c27bc69c5a1a940ba6d57
-
Size
53KB
-
MD5
599e7ece6c2232fb535831b55dccb36a
-
SHA1
af013ba3809a79151d63133824356398f19f7ede
-
SHA256
dd5eca1c0a35472d4cd1d40fe133a02250a4d544eb0c27bc69c5a1a940ba6d57
-
SHA512
77aed87a2857847b3edf6c1483c19e15fa88a08a17769ec19c78b533da2913f38cc3647bd3ffaa4bb90550fa8eb66f4289296d844aaa0e1146b621a0987387a7
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-