General
-
Target
cb755ecf4367d3934c8a1e54ff314890de72db3e54f037acdbf20cb82ee7272c
-
Size
204KB
-
Sample
220220-cgwg7sgegj
-
MD5
b2a8e087a58b7ae25ac3c85f8d468ebb
-
SHA1
d3d39b86f3fafde2c21f4d304a04ad579965f19e
-
SHA256
cb755ecf4367d3934c8a1e54ff314890de72db3e54f037acdbf20cb82ee7272c
-
SHA512
032a2b686215d1c108397c8af88420550fb9e5cb0d91d24539a3d9385dae816dbc45f409372cb3056e87fd23c32fed0469a27e7c4f48398c3c7108ce8e376c0b
Static task
static1
Behavioral task
behavioral1
Sample
cb755ecf4367d3934c8a1e54ff314890de72db3e54f037acdbf20cb82ee7272c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cb755ecf4367d3934c8a1e54ff314890de72db3e54f037acdbf20cb82ee7272c.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
cb755ecf4367d3934c8a1e54ff314890de72db3e54f037acdbf20cb82ee7272c
-
Size
204KB
-
MD5
b2a8e087a58b7ae25ac3c85f8d468ebb
-
SHA1
d3d39b86f3fafde2c21f4d304a04ad579965f19e
-
SHA256
cb755ecf4367d3934c8a1e54ff314890de72db3e54f037acdbf20cb82ee7272c
-
SHA512
032a2b686215d1c108397c8af88420550fb9e5cb0d91d24539a3d9385dae816dbc45f409372cb3056e87fd23c32fed0469a27e7c4f48398c3c7108ce8e376c0b
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-