General
-
Target
ca4bed0330558829a5b642a63ea28bceb62def74b6a3e309460eea4e185da106.sample
-
Size
333KB
-
Sample
240227-wjk9ssfh7w
-
MD5
e2132d123382278c9646ae2ebbe3b3a7
-
SHA1
f2b257bb84b29ba0c73faf854e39470ace9801a7
-
SHA256
ca4bed0330558829a5b642a63ea28bceb62def74b6a3e309460eea4e185da106
-
SHA512
c703eb197ae7abcd3f1cd53d82f832de24e4263dfdc018bb573f895d1d507585d0944225d9ad510e8abbb757ffd8beba1d74084a3ffd2afd40dc2d550080991a
-
SSDEEP
6144:3kvY9W2QcboLKCwSuo0/WdjEXCNVDLNU3mxcK3PnXvBHkyEXq:3kw9XbCwSuo0/EEXCNJprX1kyEXq
Behavioral task
behavioral1
Sample
ca4bed0330558829a5b642a63ea28bceb62def74b6a3e309460eea4e185da106.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca4bed0330558829a5b642a63ea28bceb62def74b6a3e309460eea4e185da106.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\How_to_back_files.html
Extracted
C:\Program Files\How_to_back_files.html
Targets
-
-
Target
ca4bed0330558829a5b642a63ea28bceb62def74b6a3e309460eea4e185da106.sample
-
Size
333KB
-
MD5
e2132d123382278c9646ae2ebbe3b3a7
-
SHA1
f2b257bb84b29ba0c73faf854e39470ace9801a7
-
SHA256
ca4bed0330558829a5b642a63ea28bceb62def74b6a3e309460eea4e185da106
-
SHA512
c703eb197ae7abcd3f1cd53d82f832de24e4263dfdc018bb573f895d1d507585d0944225d9ad510e8abbb757ffd8beba1d74084a3ffd2afd40dc2d550080991a
-
SSDEEP
6144:3kvY9W2QcboLKCwSuo0/WdjEXCNVDLNU3mxcK3PnXvBHkyEXq:3kw9XbCwSuo0/EEXCNJprX1kyEXq
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (3887) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-