General
-
Target
697d752697c1045a0e55e90d6593fbd0bc66b49c1ef52d1b813ea8b23a890fed
-
Size
53KB
-
Sample
220211-hlye9acaa4
-
MD5
2f4fe65723c69894112eed9b3723846b
-
SHA1
f1240d919b70116919b11601352cc650b4d8a61b
-
SHA256
697d752697c1045a0e55e90d6593fbd0bc66b49c1ef52d1b813ea8b23a890fed
-
SHA512
114cd194bd4e5399ece0cf6a198c3d7d6d1b588e1c8b0ac73a3e0bb311d9ae9d3693f1c8b71c7d2c416e026ae194023e4eff8dce23ac9147746913adfd277c58
Static task
static1
Behavioral task
behavioral1
Sample
697d752697c1045a0e55e90d6593fbd0bc66b49c1ef52d1b813ea8b23a890fed.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
697d752697c1045a0e55e90d6593fbd0bc66b49c1ef52d1b813ea8b23a890fed.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
697d752697c1045a0e55e90d6593fbd0bc66b49c1ef52d1b813ea8b23a890fed
-
Size
53KB
-
MD5
2f4fe65723c69894112eed9b3723846b
-
SHA1
f1240d919b70116919b11601352cc650b4d8a61b
-
SHA256
697d752697c1045a0e55e90d6593fbd0bc66b49c1ef52d1b813ea8b23a890fed
-
SHA512
114cd194bd4e5399ece0cf6a198c3d7d6d1b588e1c8b0ac73a3e0bb311d9ae9d3693f1c8b71c7d2c416e026ae194023e4eff8dce23ac9147746913adfd277c58
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-