General
-
Target
951facf3f3ef6f6163aa87383953132563d8ef1508b60cb130b1b7d5b96552aa.sample
-
Size
335KB
-
Sample
240227-wdpd9sfd76
-
MD5
971e7aa8b0f947b99c9efaeff6ec6829
-
SHA1
8736231b49625d21d51e9def26234fd30ec94643
-
SHA256
951facf3f3ef6f6163aa87383953132563d8ef1508b60cb130b1b7d5b96552aa
-
SHA512
4c639ab003b32363bfb8a3d4d25db5bcab535f228267f9d50d80d4c18e8b304ce6266e486bb29f475b994356694dc84bbafc52e06bceeba768411026dd42f4cc
-
SSDEEP
6144:Ss39QEhvsfBm9LA8CwumYTyBR/APygP9cnPRpjbeVPDGsIFvrMqu:z9dSSA8CwumYTyBJAPyglgq1f2rMqu
Behavioral task
behavioral1
Sample
951facf3f3ef6f6163aa87383953132563d8ef1508b60cb130b1b7d5b96552aa.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
951facf3f3ef6f6163aa87383953132563d8ef1508b60cb130b1b7d5b96552aa.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\da-DK\HOW_TO_BACK_FILES.html
Targets
-
-
Target
951facf3f3ef6f6163aa87383953132563d8ef1508b60cb130b1b7d5b96552aa.sample
-
Size
335KB
-
MD5
971e7aa8b0f947b99c9efaeff6ec6829
-
SHA1
8736231b49625d21d51e9def26234fd30ec94643
-
SHA256
951facf3f3ef6f6163aa87383953132563d8ef1508b60cb130b1b7d5b96552aa
-
SHA512
4c639ab003b32363bfb8a3d4d25db5bcab535f228267f9d50d80d4c18e8b304ce6266e486bb29f475b994356694dc84bbafc52e06bceeba768411026dd42f4cc
-
SSDEEP
6144:Ss39QEhvsfBm9LA8CwumYTyBR/APygP9cnPRpjbeVPDGsIFvrMqu:z9dSSA8CwumYTyBJAPyglgq1f2rMqu
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7546) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-