General
-
Target
cf3b068448640298738c2a407427335a289832d0c0013fda10e0fceceb208cd9.sample
-
Size
332KB
-
Sample
240227-wj4fdaff34
-
MD5
10c5fde0d48f9058490705ce7646d73b
-
SHA1
204eaa05dd25c6d71cef19b16c0cd232b05e1ae8
-
SHA256
cf3b068448640298738c2a407427335a289832d0c0013fda10e0fceceb208cd9
-
SHA512
7d37506597ca2e8bf624d0c6fca592e72e436fe4b906ac6334a4ff6b57f363834bf35f1038209e6bf67d43b39f538b7ebdd72a2b268dd1297bf6c99728e48854
-
SSDEEP
6144:Sq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/RiXq:S4JsE3CKUf+9xwL15cDCzie1ChhXq
Behavioral task
behavioral1
Sample
cf3b068448640298738c2a407427335a289832d0c0013fda10e0fceceb208cd9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cf3b068448640298738c2a407427335a289832d0c0013fda10e0fceceb208cd9.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
\Device\HarddiskVolume1\How_to_back_files.html
Extracted
C:\odt\How_to_back_files.html
Targets
-
-
Target
cf3b068448640298738c2a407427335a289832d0c0013fda10e0fceceb208cd9.sample
-
Size
332KB
-
MD5
10c5fde0d48f9058490705ce7646d73b
-
SHA1
204eaa05dd25c6d71cef19b16c0cd232b05e1ae8
-
SHA256
cf3b068448640298738c2a407427335a289832d0c0013fda10e0fceceb208cd9
-
SHA512
7d37506597ca2e8bf624d0c6fca592e72e436fe4b906ac6334a4ff6b57f363834bf35f1038209e6bf67d43b39f538b7ebdd72a2b268dd1297bf6c99728e48854
-
SSDEEP
6144:Sq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/RiXq:S4JsE3CKUf+9xwL15cDCzie1ChhXq
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7582) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-