General
-
Target
89de605a720680233ddcdcd6d8fdd55f4b349e444aa416e2da924623d75979d6
-
Size
36KB
-
Sample
221027-ntfs3abhh9
-
MD5
ba3cb3d8a6cfd99d439182777eecad65
-
SHA1
aa782d669ef961e30b0426c93ffbaf19d6ff317b
-
SHA256
89de605a720680233ddcdcd6d8fdd55f4b349e444aa416e2da924623d75979d6
-
SHA512
45cc8a3d5a88bb228a1059dc94589cdb94195a7441669384c9379ce88ba0da09b041938f93473570aff6c9ef7bfca1701a65901b120d6254686ff219f45adf41
-
SSDEEP
768:pRdv8WTq2axpsLy4JjYwD6AheFcI2iUBes+Dbl2oFilObJXZ:pRdvLqrALfJEcP1esKb3rVXZ
Static task
static1
Behavioral task
behavioral1
Sample
1cestart.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cestart.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\info.hta
Extracted
C:\users\public\desktop\info.hta
Targets
-
-
Target
1cestart.exe
-
Size
56KB
-
MD5
bdb207908c7c6b2a7724250f0805ffbe
-
SHA1
c815ea8d2b4657d9583ed99f8f264704bd12aa9b
-
SHA256
8f757ae6b2d10afe86a399af9bc93438aec71e083ca7ad0e163a7e459831619d
-
SHA512
cf91315fd7a4f70067483aeefbf4e4b2f61af82fa6f409f867ab526a4d175489601878f33a5e480adf574ac9dd53e154fb20efde6a918767cc9aeca815b13fa5
-
SSDEEP
1536:yNeRBl5PT/rx1mzwRMSTdLpJGcbXobO1uwwDBr:yQRrmzwR5JHXl1uT9
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-