General
-
Target
0e4893b6d43728b8d7b9c1483ac5aa03eaa2be552963703369461bb77e653303
-
Size
748KB
-
Sample
221126-qbdbbsed63
-
MD5
233f3620139e38ec5ae44f2ea73b2122
-
SHA1
4e582a1411167b7eb59633fe3102c4c1cd19b92f
-
SHA256
0e4893b6d43728b8d7b9c1483ac5aa03eaa2be552963703369461bb77e653303
-
SHA512
76764469bf253fe56a8c9d543ce327b4bdb60a058041dcd97ceebc9d47999e47221326315d7616fb04dd19376ed64a7857f6f06ce7fa7fbcb841873044262593
-
SSDEEP
12288:geWzt13drPsKlgTA0Ow/WnX5m9stu1EgpU55jgG4HdRUdWQiHL:gee4KCOznX5R4KgQ5RBC
Static task
static1
Behavioral task
behavioral1
Sample
0e4893b6d43728b8d7b9c1483ac5aa03eaa2be552963703369461bb77e653303.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0e4893b6d43728b8d7b9c1483ac5aa03eaa2be552963703369461bb77e653303.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-kfkizxi.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-kfkizxi.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Extracted
C:\ProgramData\zlwdkgg.html
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion
Targets
-
-
Target
0e4893b6d43728b8d7b9c1483ac5aa03eaa2be552963703369461bb77e653303
-
Size
748KB
-
MD5
233f3620139e38ec5ae44f2ea73b2122
-
SHA1
4e582a1411167b7eb59633fe3102c4c1cd19b92f
-
SHA256
0e4893b6d43728b8d7b9c1483ac5aa03eaa2be552963703369461bb77e653303
-
SHA512
76764469bf253fe56a8c9d543ce327b4bdb60a058041dcd97ceebc9d47999e47221326315d7616fb04dd19376ed64a7857f6f06ce7fa7fbcb841873044262593
-
SSDEEP
12288:geWzt13drPsKlgTA0Ow/WnX5m9stu1EgpU55jgG4HdRUdWQiHL:gee4KCOznX5R4KgQ5RBC
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-