General
-
Target
8339469512.zip
-
Size
379KB
-
Sample
221111-kcnkssaff8
-
MD5
3432bafb5da4c8e7c76ed44556bd6a4b
-
SHA1
b44522fbf3cacccee138c8fe623757bc298a2338
-
SHA256
8bf7bac1bbd402ca8cc628626296e42da41d506b646a7fb13703ddea102bf7b4
-
SHA512
100d204b5e2afdc6bb17cfb027855ef1d80f404659972bf8db783ee4097f002de7f816fc4a119d6bce83edfdfdd06aa6c7de3f2a637021984465c74b10d08184
-
SSDEEP
6144:u3sllJl5zyrzKZOWZ4ebRuUkMd8VYfuHeMgkA079HZLcvMs5dLSHhtbNRUD:PlR5zyc02QeMgQZLwWRm
Static task
static1
Behavioral task
behavioral1
Sample
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
b188674706de2125e487aadc14769e5e4c20f311a1abfd098441c4a8bc41ed27.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
b188674706de2125e487aadc14769e5e4c20f311a1abfd098441c4a8bc41ed27.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\info.hta
Extracted
C:\Users\Admin\Desktop\info.hta
Extracted
C:\users\public\desktop\info.hta
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6
-
Size
56KB
-
MD5
62885d0f106569fac3985f72f0ca10cb
-
SHA1
cb37b10b209ab38477d2e17f21cae12a1cb2adf0
-
SHA256
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6
-
SHA512
1fdd982323e314b97dc4b6878f92e965aeefee9f89203c4ca944e8e540d5a990dcb5cbfb5455794e1ef3ad3e7d990e20b12af70f3310b1ff92c8402c43275c2a
-
SSDEEP
1536:sNeRBl5PT/rx1mzwRMSTdLpJNr+eiukbsSw:sQRrmzwR5JViums
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
-
-
Target
b188674706de2125e487aadc14769e5e4c20f311a1abfd098441c4a8bc41ed27
-
Size
753KB
-
MD5
4f1025c0661cc0fa578a52466fa65b71
-
SHA1
591d9da3673498a3cf184637c0b83e62fa7e1e8c
-
SHA256
b188674706de2125e487aadc14769e5e4c20f311a1abfd098441c4a8bc41ed27
-
SHA512
9e75f94bccc8a78d2436455d58eab1fb4632b98351e0af5417a82d85a1ee541086331a1cd30611ec5782e24eb3fbf448eee5cbb605b05219131d997f1325a0a5
-
SSDEEP
12288:jzKha/nj5OLpdNIrd4Dx5OLpdNIrd4Di:7FmXIrdCmXIrdf
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-