General
-
Target
e5ceb42928a16190aeb1a9893c89e808a756a30193ccd542f63c726da7d9fa5c
-
Size
214KB
-
Sample
220220-bcferagafq
-
MD5
4d3454c85d85856674bb6e835f139649
-
SHA1
a8d64f6dddff26b423793e08994a6ee19077c1f7
-
SHA256
e5ceb42928a16190aeb1a9893c89e808a756a30193ccd542f63c726da7d9fa5c
-
SHA512
e713ee2c5fe12dfa27e8294ce1a6415221cccead720dd5163d6ccb399518a810ad567db39023a763ce39a8b861b39400f1faa56d8398c7c64fa7a5fdc2010c6c
Static task
static1
Behavioral task
behavioral1
Sample
e5ceb42928a16190aeb1a9893c89e808a756a30193ccd542f63c726da7d9fa5c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e5ceb42928a16190aeb1a9893c89e808a756a30193ccd542f63c726da7d9fa5c.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
e5ceb42928a16190aeb1a9893c89e808a756a30193ccd542f63c726da7d9fa5c
-
Size
214KB
-
MD5
4d3454c85d85856674bb6e835f139649
-
SHA1
a8d64f6dddff26b423793e08994a6ee19077c1f7
-
SHA256
e5ceb42928a16190aeb1a9893c89e808a756a30193ccd542f63c726da7d9fa5c
-
SHA512
e713ee2c5fe12dfa27e8294ce1a6415221cccead720dd5163d6ccb399518a810ad567db39023a763ce39a8b861b39400f1faa56d8398c7c64fa7a5fdc2010c6c
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-