General
-
Target
6c77cb165c448b2749b7e2afa9ac67640a9d8e0d96cc821c08adcea07759090b.sample
-
Size
334KB
-
Sample
240227-wavrwaff5z
-
MD5
7112401374cf8903070d6927e2e1f395
-
SHA1
1668adc483cf5549e30197217ccf4dd4ab667eff
-
SHA256
6c77cb165c448b2749b7e2afa9ac67640a9d8e0d96cc821c08adcea07759090b
-
SHA512
e93aeb0f651773e9b6291e684ecfd1939f14baa2f0eab3146765de484fd980b636c3bd878455b326c0ad0c2c23980371f9bde5efce20e1067166e06490aa7d50
-
SSDEEP
6144:Pkv89W2QcboLPlZbqEKvSlvgXCBVnTDg3GV06rPnej63AVLyEXq:Pk09XelZbqEKv8gXCBlPHeHLyEXq
Behavioral task
behavioral1
Sample
6c77cb165c448b2749b7e2afa9ac67640a9d8e0d96cc821c08adcea07759090b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c77cb165c448b2749b7e2afa9ac67640a9d8e0d96cc821c08adcea07759090b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\HOW_TO_BACK_FILES.html
Extracted
C:\odt\HOW_TO_BACK_FILES.html
Targets
-
-
Target
6c77cb165c448b2749b7e2afa9ac67640a9d8e0d96cc821c08adcea07759090b.sample
-
Size
334KB
-
MD5
7112401374cf8903070d6927e2e1f395
-
SHA1
1668adc483cf5549e30197217ccf4dd4ab667eff
-
SHA256
6c77cb165c448b2749b7e2afa9ac67640a9d8e0d96cc821c08adcea07759090b
-
SHA512
e93aeb0f651773e9b6291e684ecfd1939f14baa2f0eab3146765de484fd980b636c3bd878455b326c0ad0c2c23980371f9bde5efce20e1067166e06490aa7d50
-
SSDEEP
6144:Pkv89W2QcboLPlZbqEKvSlvgXCBVnTDg3GV06rPnej63AVLyEXq:Pk09XelZbqEKv8gXCBlPHeHLyEXq
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7546) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-