General
-
Target
368c14f37d30d8ede691c5a6cd14dbd2f7d05e26f15d1c293a1072034ee51e9f
-
Size
103KB
-
Sample
220306-bcf2aabdfm
-
MD5
7634112d02adee2f086021bf97f8512c
-
SHA1
4d0c9dd7d45def2b6067866509a5705e5a0a0c8f
-
SHA256
368c14f37d30d8ede691c5a6cd14dbd2f7d05e26f15d1c293a1072034ee51e9f
-
SHA512
a87307a5fc325c040ae57f30a8538e78db7ced4952e6d1826e86783acedbb4d72de57b3654ad115d7e485388f4616d27acf3e54e5629cf00f374750d70f0c4bb
Static task
static1
Behavioral task
behavioral1
Sample
368c14f37d30d8ede691c5a6cd14dbd2f7d05e26f15d1c293a1072034ee51e9f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
368c14f37d30d8ede691c5a6cd14dbd2f7d05e26f15d1c293a1072034ee51e9f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3448722404\readme-warning.txt
makop
Targets
-
-
Target
368c14f37d30d8ede691c5a6cd14dbd2f7d05e26f15d1c293a1072034ee51e9f
-
Size
103KB
-
MD5
7634112d02adee2f086021bf97f8512c
-
SHA1
4d0c9dd7d45def2b6067866509a5705e5a0a0c8f
-
SHA256
368c14f37d30d8ede691c5a6cd14dbd2f7d05e26f15d1c293a1072034ee51e9f
-
SHA512
a87307a5fc325c040ae57f30a8538e78db7ced4952e6d1826e86783acedbb4d72de57b3654ad115d7e485388f4616d27acf3e54e5629cf00f374750d70f0c4bb
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-