General
-
Target
91ff613c7eddb4fb74412e4be00ab7803af2e8f16ab094cf9bcc99e0e0cb1b20.exe.compressed
-
Size
99KB
-
Sample
240128-31y1jsdef9
-
MD5
88e7ae140342db545f3f735dc11db65c
-
SHA1
34ab34028399744254eb231aade8d64c9e898dad
-
SHA256
ed6d456a48377792d68401b8da536f9b00c269a18142a7123b911e6c16e068a9
-
SHA512
0df5d4319244b11bb37b400ee62fcd7748fece3edf197e33f432a4c59129d2a6407d0a900c55f1bc6be6d1239fb1f583b78d68aa6b705bb9a5957bbaaa6835f7
-
SSDEEP
3072:sZz9omcf9qy10Ve79MJAqLg39Xs/6zMQKE/O:AKmi11f79MJAqsNXNzMQKQO
Behavioral task
behavioral1
Sample
91ff613c7eddb4fb74412e4be00ab7803af2e8f16ab094cf9bcc99e0e0cb1b20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
91ff613c7eddb4fb74412e4be00ab7803af2e8f16ab094cf9bcc99e0e0cb1b20.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
91ff613c7eddb4fb74412e4be00ab7803af2e8f16ab094cf9bcc99e0e0cb1b20.exe.compressed
-
Size
99KB
-
MD5
88e7ae140342db545f3f735dc11db65c
-
SHA1
34ab34028399744254eb231aade8d64c9e898dad
-
SHA256
ed6d456a48377792d68401b8da536f9b00c269a18142a7123b911e6c16e068a9
-
SHA512
0df5d4319244b11bb37b400ee62fcd7748fece3edf197e33f432a4c59129d2a6407d0a900c55f1bc6be6d1239fb1f583b78d68aa6b705bb9a5957bbaaa6835f7
-
SSDEEP
3072:sZz9omcf9qy10Ve79MJAqLg39Xs/6zMQKE/O:AKmi11f79MJAqsNXNzMQKQO
Score9/10-
Detects command variations typically used by ransomware
-
Detects executables containing many references to VEEAM. Observed in ransomware
-
Detects executables referencing many IR and analysis tools
-
Renames multiple (272) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies boot configuration data using bcdedit
-
Sets desktop wallpaper using registry
-