General
-
Target
77f43bb26b71c6175658d45e61fc59f5e36de6a49c701968d47c028a14be3e8d
-
Size
53KB
-
Sample
220211-hkaykadfdl
-
MD5
b8210349ad7b114c263b007bf51ac01e
-
SHA1
14fb78c128e82b219cb778948e00056ebe00ec39
-
SHA256
77f43bb26b71c6175658d45e61fc59f5e36de6a49c701968d47c028a14be3e8d
-
SHA512
9e864fcfabef250cf37ee9d137f5fd49439b6b50aae6b6198cdab0be69baae7b955cfbf2f894775123a69faa262d558d4d4586caf3e0655b8781a9793a882079
Static task
static1
Behavioral task
behavioral1
Sample
77f43bb26b71c6175658d45e61fc59f5e36de6a49c701968d47c028a14be3e8d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
77f43bb26b71c6175658d45e61fc59f5e36de6a49c701968d47c028a14be3e8d.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
77f43bb26b71c6175658d45e61fc59f5e36de6a49c701968d47c028a14be3e8d
-
Size
53KB
-
MD5
b8210349ad7b114c263b007bf51ac01e
-
SHA1
14fb78c128e82b219cb778948e00056ebe00ec39
-
SHA256
77f43bb26b71c6175658d45e61fc59f5e36de6a49c701968d47c028a14be3e8d
-
SHA512
9e864fcfabef250cf37ee9d137f5fd49439b6b50aae6b6198cdab0be69baae7b955cfbf2f894775123a69faa262d558d4d4586caf3e0655b8781a9793a882079
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-