General
-
Target
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55
-
Size
53KB
-
Sample
220211-he7qcadegn
-
MD5
0371b969f310c5dfbdd79c7cf9658cb3
-
SHA1
70cbd69f69ce164dae29febfca371ea30f2fbd62
-
SHA256
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55
-
SHA512
39ae060fd0d0eeffc3f1df2e872a8bf31d5e80553197523e56629178a5b7fbf56e8654f7b55cb2f9d540d22d326f109d2abeec837f1c66582a6297c8b5dbadd3
Static task
static1
Behavioral task
behavioral1
Sample
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
http-equiv="Content-Type"
Extracted
C:\how_to_back_files.html
http-equiv="Content-Type"
Targets
-
-
Target
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55
-
Size
53KB
-
MD5
0371b969f310c5dfbdd79c7cf9658cb3
-
SHA1
70cbd69f69ce164dae29febfca371ea30f2fbd62
-
SHA256
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55
-
SHA512
39ae060fd0d0eeffc3f1df2e872a8bf31d5e80553197523e56629178a5b7fbf56e8654f7b55cb2f9d540d22d326f109d2abeec837f1c66582a6297c8b5dbadd3
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-