General
-
Target
761fe7fde9899b8482bcd2a1800c442201cc866fb8e0e28969474d51fb412997
-
Size
2.6MB
-
Sample
220503-skw6xaaab5
-
MD5
678c88c9fa4bd905d617530e3ed3f092
-
SHA1
f2019598e111d8833fb0a7b663e5035a3db47eac
-
SHA256
761fe7fde9899b8482bcd2a1800c442201cc866fb8e0e28969474d51fb412997
-
SHA512
aa1b26d398f273a838d6623701ba84314cc691c4bbbc51703af34ad3d5f503a66dc42fb5838e66f4e84004aaf23e29caf6113a8b17891179b62fd3d7773cde5d
Static task
static1
Behavioral task
behavioral1
Sample
761fe7fde9899b8482bcd2a1800c442201cc866fb8e0e28969474d51fb412997.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
761fe7fde9899b8482bcd2a1800c442201cc866fb8e0e28969474d51fb412997.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
761fe7fde9899b8482bcd2a1800c442201cc866fb8e0e28969474d51fb412997
-
Size
2.6MB
-
MD5
678c88c9fa4bd905d617530e3ed3f092
-
SHA1
f2019598e111d8833fb0a7b663e5035a3db47eac
-
SHA256
761fe7fde9899b8482bcd2a1800c442201cc866fb8e0e28969474d51fb412997
-
SHA512
aa1b26d398f273a838d6623701ba84314cc691c4bbbc51703af34ad3d5f503a66dc42fb5838e66f4e84004aaf23e29caf6113a8b17891179b62fd3d7773cde5d
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-