General
-
Target
8b6af2ac39a80dd70e0b7825e116802c9811129eb0a071c086e0440d6afef7e3
-
Size
53KB
-
Sample
220211-hhgy4adfar
-
MD5
219c8cf5fce1e0c1fc606f10c685507c
-
SHA1
e3ff139b04465febb88e3831eba90249c5ca22a9
-
SHA256
8b6af2ac39a80dd70e0b7825e116802c9811129eb0a071c086e0440d6afef7e3
-
SHA512
6802a1364da38f5dab8b803b5bbf27c1985b7d5f19e8f840f9215b13155df69962d6ade0ae9a0bf9fc89368bc84a7a9dcc12b771554e20bf3907af1988af6262
Static task
static1
Behavioral task
behavioral1
Sample
8b6af2ac39a80dd70e0b7825e116802c9811129eb0a071c086e0440d6afef7e3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8b6af2ac39a80dd70e0b7825e116802c9811129eb0a071c086e0440d6afef7e3.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
8b6af2ac39a80dd70e0b7825e116802c9811129eb0a071c086e0440d6afef7e3
-
Size
53KB
-
MD5
219c8cf5fce1e0c1fc606f10c685507c
-
SHA1
e3ff139b04465febb88e3831eba90249c5ca22a9
-
SHA256
8b6af2ac39a80dd70e0b7825e116802c9811129eb0a071c086e0440d6afef7e3
-
SHA512
6802a1364da38f5dab8b803b5bbf27c1985b7d5f19e8f840f9215b13155df69962d6ade0ae9a0bf9fc89368bc84a7a9dcc12b771554e20bf3907af1988af6262
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-