General
-
Target
bce33065d06ee9290d73c7a470235508f605c9fef72dd0ebf480876c2ba593b9
-
Size
207KB
-
Sample
220220-c4pceafhb4
-
MD5
7899090dd1b61fc2d85b50473e500d8b
-
SHA1
9c972c2696d68d3d29726cdba061e31c51663c12
-
SHA256
bce33065d06ee9290d73c7a470235508f605c9fef72dd0ebf480876c2ba593b9
-
SHA512
b976e2f12bcb13ff10fb70338fac775356fb40ba36d11c40c72028c723d452e49128050dc30bac9d66e205162f2994d0f07aeb74a271fd494fd39cd1718b9c6b
Static task
static1
Behavioral task
behavioral1
Sample
bce33065d06ee9290d73c7a470235508f605c9fef72dd0ebf480876c2ba593b9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bce33065d06ee9290d73c7a470235508f605c9fef72dd0ebf480876c2ba593b9.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
bce33065d06ee9290d73c7a470235508f605c9fef72dd0ebf480876c2ba593b9
-
Size
207KB
-
MD5
7899090dd1b61fc2d85b50473e500d8b
-
SHA1
9c972c2696d68d3d29726cdba061e31c51663c12
-
SHA256
bce33065d06ee9290d73c7a470235508f605c9fef72dd0ebf480876c2ba593b9
-
SHA512
b976e2f12bcb13ff10fb70338fac775356fb40ba36d11c40c72028c723d452e49128050dc30bac9d66e205162f2994d0f07aeb74a271fd494fd39cd1718b9c6b
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-