General
-
Target
316219329a6c6a9bb1c0cdcf58faf187f9981b38c586744947a1e1fc62abb436
-
Size
53KB
-
Sample
220211-hvzdxacba7
-
MD5
69e91e6c0522e80bf817578e6c8b5f24
-
SHA1
e7c4dfbb8d3c38954da3713c69164d31b4f76e0c
-
SHA256
316219329a6c6a9bb1c0cdcf58faf187f9981b38c586744947a1e1fc62abb436
-
SHA512
2cc3faa9e663cbbe318dd1846c26bdaf684e8efe0345f6caf616943002a4a6f6cab7dd2493341f09b2619147bc836b65331b0ca4c701765b69167e97f18f0ac8
Static task
static1
Behavioral task
behavioral1
Sample
316219329a6c6a9bb1c0cdcf58faf187f9981b38c586744947a1e1fc62abb436.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
316219329a6c6a9bb1c0cdcf58faf187f9981b38c586744947a1e1fc62abb436.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
316219329a6c6a9bb1c0cdcf58faf187f9981b38c586744947a1e1fc62abb436
-
Size
53KB
-
MD5
69e91e6c0522e80bf817578e6c8b5f24
-
SHA1
e7c4dfbb8d3c38954da3713c69164d31b4f76e0c
-
SHA256
316219329a6c6a9bb1c0cdcf58faf187f9981b38c586744947a1e1fc62abb436
-
SHA512
2cc3faa9e663cbbe318dd1846c26bdaf684e8efe0345f6caf616943002a4a6f6cab7dd2493341f09b2619147bc836b65331b0ca4c701765b69167e97f18f0ac8
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-