General
-
Target
6c4ae5609217e219a5b62eb0cbf65e59911dedf8be61fc708a2e9aa19dfe6d6f
-
Size
53KB
-
Sample
220211-hlrbyadffk
-
MD5
99c1694d164075f785d5d4a02352a65b
-
SHA1
557e5669c189c9b411e800bce51fae7b8071c244
-
SHA256
6c4ae5609217e219a5b62eb0cbf65e59911dedf8be61fc708a2e9aa19dfe6d6f
-
SHA512
1b537d798d5c4cf133a6b1deead694ae6cfcf70ced46f7ba85c0f11921ad1454369e502647c1da6981629194d5083fbb1eadd5b0f6540de742ea311162e55b82
Static task
static1
Behavioral task
behavioral1
Sample
6c4ae5609217e219a5b62eb0cbf65e59911dedf8be61fc708a2e9aa19dfe6d6f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6c4ae5609217e219a5b62eb0cbf65e59911dedf8be61fc708a2e9aa19dfe6d6f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Read_me.html
Extracted
C:\Read_me.html
Targets
-
-
Target
6c4ae5609217e219a5b62eb0cbf65e59911dedf8be61fc708a2e9aa19dfe6d6f
-
Size
53KB
-
MD5
99c1694d164075f785d5d4a02352a65b
-
SHA1
557e5669c189c9b411e800bce51fae7b8071c244
-
SHA256
6c4ae5609217e219a5b62eb0cbf65e59911dedf8be61fc708a2e9aa19dfe6d6f
-
SHA512
1b537d798d5c4cf133a6b1deead694ae6cfcf70ced46f7ba85c0f11921ad1454369e502647c1da6981629194d5083fbb1eadd5b0f6540de742ea311162e55b82
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-