General
-
Target
d1d4e29f5fca0c97cd89a4b5134d298.msi
-
Size
100KB
-
Sample
220322-pf8glabdgp
-
MD5
aebfb88d2333ee74373a4cf582682070
-
SHA1
3d8b0dd99846144287aeeb025a5c9fc254f66fc0
-
SHA256
d1d4e29f5fca0c97cd89a4b5134d298bf2829cea92e5d116084b83d980d2c6e0
-
SHA512
9feb73d9c4902f03b94df49b3087418473dd0826480b5fde8ba3654dd8bf22bb372c8881e5254e5e8a0f6cf78bfb2d80c9060208c66478362bc6f75f12fca8cb
Static task
static1
Behavioral task
behavioral1
Sample
d1d4e29f5fca0c97cd89a4b5134d298.msi
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
d1d4e29f5fca0c97cd89a4b5134d298.msi
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
d1d4e29f5fca0c97cd89a4b5134d298.msi
-
Size
100KB
-
MD5
aebfb88d2333ee74373a4cf582682070
-
SHA1
3d8b0dd99846144287aeeb025a5c9fc254f66fc0
-
SHA256
d1d4e29f5fca0c97cd89a4b5134d298bf2829cea92e5d116084b83d980d2c6e0
-
SHA512
9feb73d9c4902f03b94df49b3087418473dd0826480b5fde8ba3654dd8bf22bb372c8881e5254e5e8a0f6cf78bfb2d80c9060208c66478362bc6f75f12fca8cb
Score9/10-
Modifies boot configuration data using bcdedit
-
Blocklisted process makes network request
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-