General
-
Target
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566
-
Size
1.1MB
-
Sample
220701-rgp3rahbc2
-
MD5
67602186447c604718f329e4a75efa30
-
SHA1
da92fac48b831c782fe13704c444518dfab9f43f
-
SHA256
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566
-
SHA512
99bc50931bfd4bedacdef49ed52d3270327d6314e661bafeac4c7099f4a95f1c1c555726769898876fafe0fa1c3303797b1a09604bead0795f297c75ff372590
Static task
static1
Behavioral task
behavioral1
Sample
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566
-
Size
1.1MB
-
MD5
67602186447c604718f329e4a75efa30
-
SHA1
da92fac48b831c782fe13704c444518dfab9f43f
-
SHA256
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566
-
SHA512
99bc50931bfd4bedacdef49ed52d3270327d6314e661bafeac4c7099f4a95f1c1c555726769898876fafe0fa1c3303797b1a09604bead0795f297c75ff372590
Score10/10-
CrypVault
Ransomware family which makes encrypted files look like they have been quarantined by AV.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-