General
-
Target
846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378.sample
-
Size
333KB
-
Sample
240227-wcq7gafg3v
-
MD5
0fc26e931a324948a7d5e5a0008bf3c7
-
SHA1
aa6018a65a0ae90d33451dd8f4fc647179ee93e1
-
SHA256
846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378
-
SHA512
95dd8fd0973ac6166fda194b90e84f57d637ca3e1954733b19446abcd13ee89c09388bddf626cf9ee4aace8d1097e244865c50738accee3adcf03b3321c6d5d3
-
SSDEEP
6144:gq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/8g7iXq:g4JsE3CKUf+9xwL15cDCzie1ChRnXq
Behavioral task
behavioral1
Sample
846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\how_to_back.html
Extracted
\Device\HarddiskVolume1\Boot\bg-BG\how_to_back.html
Targets
-
-
Target
846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378.sample
-
Size
333KB
-
MD5
0fc26e931a324948a7d5e5a0008bf3c7
-
SHA1
aa6018a65a0ae90d33451dd8f4fc647179ee93e1
-
SHA256
846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378
-
SHA512
95dd8fd0973ac6166fda194b90e84f57d637ca3e1954733b19446abcd13ee89c09388bddf626cf9ee4aace8d1097e244865c50738accee3adcf03b3321c6d5d3
-
SSDEEP
6144:gq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/8g7iXq:g4JsE3CKUf+9xwL15cDCzie1ChRnXq
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7570) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-