General
-
Target
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2
-
Size
41KB
-
Sample
220306-dsffsshhd3
-
MD5
ad29f77ee86ed9827158347befa8998d
-
SHA1
b3b380be84a7042884f1c9c9f14331faa65c51f2
-
SHA256
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2
-
SHA512
57d1e4cbfab347a35ea5ed2fa1fc5bfb61c48fd8e2f0b0ee32fbc1bb8693715e15f075e203fb462e70cf2d73e30631f9f605dbf3fd46875d14f72912710065cc
Static task
static1
Behavioral task
behavioral1
Sample
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\1589219982\readme-warning.txt
makop
Targets
-
-
Target
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2
-
Size
41KB
-
MD5
ad29f77ee86ed9827158347befa8998d
-
SHA1
b3b380be84a7042884f1c9c9f14331faa65c51f2
-
SHA256
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2
-
SHA512
57d1e4cbfab347a35ea5ed2fa1fc5bfb61c48fd8e2f0b0ee32fbc1bb8693715e15f075e203fb462e70cf2d73e30631f9f605dbf3fd46875d14f72912710065cc
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-