General
-
Target
f4db61bb14a7af406c9cfc33075c6f74ab711bedf1e1fd6edc4f524bd304c1b6
-
Size
56KB
-
Sample
221230-gspagsfa97
-
MD5
25e0c92a4e1d058d5a04089efe63b290
-
SHA1
0f34c29d2ce181dbe88bcb5d28ea8aa3c5bbd5e3
-
SHA256
f4db61bb14a7af406c9cfc33075c6f74ab711bedf1e1fd6edc4f524bd304c1b6
-
SHA512
b07fb95b6138224b789e73e398c74e91a7d311acc49621fa08b875e8dd1a2af4dec58b522ab68e49dfd6ba52085784118bf73c1067a5677551dec532ce56bd50
-
SSDEEP
1536:qNeRBl5PT/rx1mzwRMSTdLpJR1LY8EcxN/i:qQRrmzwR5JbLY8Ec
Static task
static1
Behavioral task
behavioral1
Sample
f4db61bb14a7af406c9cfc33075c6f74ab711bedf1e1fd6edc4f524bd304c1b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4db61bb14a7af406c9cfc33075c6f74ab711bedf1e1fd6edc4f524bd304c1b6.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\users\public\desktop\info.hta
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
f4db61bb14a7af406c9cfc33075c6f74ab711bedf1e1fd6edc4f524bd304c1b6
-
Size
56KB
-
MD5
25e0c92a4e1d058d5a04089efe63b290
-
SHA1
0f34c29d2ce181dbe88bcb5d28ea8aa3c5bbd5e3
-
SHA256
f4db61bb14a7af406c9cfc33075c6f74ab711bedf1e1fd6edc4f524bd304c1b6
-
SHA512
b07fb95b6138224b789e73e398c74e91a7d311acc49621fa08b875e8dd1a2af4dec58b522ab68e49dfd6ba52085784118bf73c1067a5677551dec532ce56bd50
-
SSDEEP
1536:qNeRBl5PT/rx1mzwRMSTdLpJR1LY8EcxN/i:qQRrmzwR5JbLY8Ec
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-