General
-
Target
c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.sample
-
Size
332KB
-
Sample
240227-wh26xsfh6t
-
MD5
0d5ccd706f75461b3fb9c56bc87b5c6f
-
SHA1
0c3755209682d5632a5fb20143ea7d93be5dc5e8
-
SHA256
c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1
-
SHA512
9288cdd355d9a6fab846fda6b46ea6c67ec706e089c02d9718661b754bb45be020e97bd48d7876d82a525dfaedc17f6c2303f03160932ea4d6e915f085714131
-
SSDEEP
6144:aY196WTQqBfFrQlVCuzw/322A1StYDBF+FTKtkV:R96eVFryVHzw/3XOfvtk
Behavioral task
behavioral1
Sample
c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\How_to_back_files.html
Extracted
C:\odt\How_to_back_files.html
Targets
-
-
Target
c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.sample
-
Size
332KB
-
MD5
0d5ccd706f75461b3fb9c56bc87b5c6f
-
SHA1
0c3755209682d5632a5fb20143ea7d93be5dc5e8
-
SHA256
c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1
-
SHA512
9288cdd355d9a6fab846fda6b46ea6c67ec706e089c02d9718661b754bb45be020e97bd48d7876d82a525dfaedc17f6c2303f03160932ea4d6e915f085714131
-
SSDEEP
6144:aY196WTQqBfFrQlVCuzw/322A1StYDBF+FTKtkV:R96eVFryVHzw/3XOfvtk
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (2916) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-