General
-
Target
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886
-
Size
51KB
-
Sample
220211-hemp6sbhd5
-
MD5
62294093ab058b11ae6aa2a62a660ca5
-
SHA1
da4c40e4d349a1fa3a98ec144810e64a1a87f220
-
SHA256
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886
-
SHA512
4f2bf7a71a7670d6e9ed8733b4a0b19551fdd44ff6469f5dad455ae23dc0848bfb67a5d381a8edf8b765178024e63b4eff1a4f53090d86cf91f09a4e48d2d68a
Static task
static1
Behavioral task
behavioral1
Sample
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\HOW_RECOVER.html
Extracted
C:\HOW_RECOVER.html
Targets
-
-
Target
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886
-
Size
51KB
-
MD5
62294093ab058b11ae6aa2a62a660ca5
-
SHA1
da4c40e4d349a1fa3a98ec144810e64a1a87f220
-
SHA256
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886
-
SHA512
4f2bf7a71a7670d6e9ed8733b4a0b19551fdd44ff6469f5dad455ae23dc0848bfb67a5d381a8edf8b765178024e63b4eff1a4f53090d86cf91f09a4e48d2d68a
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-