General
-
Target
b477676fa9bc4972b2448e27a2b4074edc392227da5d259e87faf2eb1c8e19c7.sample
-
Size
338KB
-
Sample
240227-wgfxasfe65
-
MD5
2f956b5649ae55091e478be5f3d33913
-
SHA1
4866b3bf81621041d38cfa3e3c1c8394cd946d8b
-
SHA256
b477676fa9bc4972b2448e27a2b4074edc392227da5d259e87faf2eb1c8e19c7
-
SHA512
679130490b3af554392543371de35b795deacdf6c03798e6b8e4a607742e2b52032434272f62b501380bc9d06bc452a6985cf7e0cf35a85d5cdd4b4be74eb59e
-
SSDEEP
6144:7m9UzSJFOa0k5miRPzuuf2p9g9w2y+DthOREvvLsUE:K9OMmiRPzum2p9gGmYdUE
Static task
static1
Behavioral task
behavioral1
Sample
b477676fa9bc4972b2448e27a2b4074edc392227da5d259e87faf2eb1c8e19c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b477676fa9bc4972b2448e27a2b4074edc392227da5d259e87faf2eb1c8e19c7.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\How_to_back_files.html
Extracted
C:\How_to_back_files.html
Targets
-
-
Target
b477676fa9bc4972b2448e27a2b4074edc392227da5d259e87faf2eb1c8e19c7.sample
-
Size
338KB
-
MD5
2f956b5649ae55091e478be5f3d33913
-
SHA1
4866b3bf81621041d38cfa3e3c1c8394cd946d8b
-
SHA256
b477676fa9bc4972b2448e27a2b4074edc392227da5d259e87faf2eb1c8e19c7
-
SHA512
679130490b3af554392543371de35b795deacdf6c03798e6b8e4a607742e2b52032434272f62b501380bc9d06bc452a6985cf7e0cf35a85d5cdd4b4be74eb59e
-
SSDEEP
6144:7m9UzSJFOa0k5miRPzuuf2p9g9w2y+DthOREvvLsUE:K9OMmiRPzum2p9gGmYdUE
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7542) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-