General
-
Target
82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b.sample
-
Size
415KB
-
Sample
240227-wcjsdsfg3s
-
MD5
ff99b9afd11f39f9bbd0acfdf5fc0e16
-
SHA1
291a6b206584602a76eaff6c750bc94962c4b621
-
SHA256
82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b
-
SHA512
11b1a48c1e4ab7f9ca3383438543f04746605b8f389783c794ad3c34a6d62970c422ac9cab0124abd1bc622b9e640e866bbd43c8fe6479640f32212460e60259
-
SSDEEP
6144:7/2pAAzX2K6wh8hymOxxIR3/LAs4RumG/vV4UWFfhai3MbmBYL:j2F19OaxiB/LAGNl43wvKM
Static task
static1
Behavioral task
behavioral1
Sample
82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\HOW_TO_BACK_FILES.html
Extracted
C:\odt\HOW_TO_BACK_FILES.html
Targets
-
-
Target
82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b.sample
-
Size
415KB
-
MD5
ff99b9afd11f39f9bbd0acfdf5fc0e16
-
SHA1
291a6b206584602a76eaff6c750bc94962c4b621
-
SHA256
82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b
-
SHA512
11b1a48c1e4ab7f9ca3383438543f04746605b8f389783c794ad3c34a6d62970c422ac9cab0124abd1bc622b9e640e866bbd43c8fe6479640f32212460e60259
-
SSDEEP
6144:7/2pAAzX2K6wh8hymOxxIR3/LAs4RumG/vV4UWFfhai3MbmBYL:j2F19OaxiB/LAGNl43wvKM
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7520) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-