General
-
Target
c1d4014e65a8d79e555378dbf8e5db5786e3b6e4c841f7f64a3f40318bb59e60.sample
-
Size
335KB
-
Sample
240227-wg8mbafe79
-
MD5
7b38d3f8dd025a9f713f44db5968ab17
-
SHA1
594dfc74d743412d598ae1b87922c96aacce582b
-
SHA256
c1d4014e65a8d79e555378dbf8e5db5786e3b6e4c841f7f64a3f40318bb59e60
-
SHA512
067abd3eb8fc4c85f53003e0e898b85d9b4eebadeb26caef299e4110d3bce19247b73a4f955e142a09961ff4c87c41b1596a3755d1e226d91ff651cdb5ea0c6c
-
SSDEEP
6144:/H39QEhvsfBm9LA8CwumYTyBR/APygP9cnPRpjbeVPDGsIFbrMqu:v9dSSA8CwumYTyBJAPyglgq1farMqu
Behavioral task
behavioral1
Sample
c1d4014e65a8d79e555378dbf8e5db5786e3b6e4c841f7f64a3f40318bb59e60.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1d4014e65a8d79e555378dbf8e5db5786e3b6e4c841f7f64a3f40318bb59e60.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\How_to_back_files.html
Extracted
C:\Program Files\How_to_back_files.html
Targets
-
-
Target
c1d4014e65a8d79e555378dbf8e5db5786e3b6e4c841f7f64a3f40318bb59e60.sample
-
Size
335KB
-
MD5
7b38d3f8dd025a9f713f44db5968ab17
-
SHA1
594dfc74d743412d598ae1b87922c96aacce582b
-
SHA256
c1d4014e65a8d79e555378dbf8e5db5786e3b6e4c841f7f64a3f40318bb59e60
-
SHA512
067abd3eb8fc4c85f53003e0e898b85d9b4eebadeb26caef299e4110d3bce19247b73a4f955e142a09961ff4c87c41b1596a3755d1e226d91ff651cdb5ea0c6c
-
SSDEEP
6144:/H39QEhvsfBm9LA8CwumYTyBR/APygP9cnPRpjbeVPDGsIFbrMqu:v9dSSA8CwumYTyBJAPyglgq1farMqu
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7586) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-