General
-
Target
cbb697f31d96253054120b5dfa8af4460f2f2a474a94f54835d2b3a39ea69f30.sample
-
Size
335KB
-
Sample
240227-wjsnwaff26
-
MD5
794f3eb31688ca56a4f7ca6f4691d3e3
-
SHA1
6f6e458805f8da94f820f2aff6a201b70482273d
-
SHA256
cbb697f31d96253054120b5dfa8af4460f2f2a474a94f54835d2b3a39ea69f30
-
SHA512
cd7e6feda73af8d569466b9ea5ed46c4784c404afcaec6b1582d1fa8a1c00b18aea8b7851f298e1eb740e328dbd5d5ad932c13036699b05e5807ad85641e0dff
-
SSDEEP
6144:5Y9zfajnC6iGm15k66Clhdq8yZXlkV68pr2g1PJbmVhMqu:m9WHm15k66ClHq8yZVypIMqu
Behavioral task
behavioral1
Sample
cbb697f31d96253054120b5dfa8af4460f2f2a474a94f54835d2b3a39ea69f30.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbb697f31d96253054120b5dfa8af4460f2f2a474a94f54835d2b3a39ea69f30.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\How_to_back_files.html
Extracted
\Device\HarddiskVolume1\Boot\bg-BG\How_to_back_files.html
Targets
-
-
Target
cbb697f31d96253054120b5dfa8af4460f2f2a474a94f54835d2b3a39ea69f30.sample
-
Size
335KB
-
MD5
794f3eb31688ca56a4f7ca6f4691d3e3
-
SHA1
6f6e458805f8da94f820f2aff6a201b70482273d
-
SHA256
cbb697f31d96253054120b5dfa8af4460f2f2a474a94f54835d2b3a39ea69f30
-
SHA512
cd7e6feda73af8d569466b9ea5ed46c4784c404afcaec6b1582d1fa8a1c00b18aea8b7851f298e1eb740e328dbd5d5ad932c13036699b05e5807ad85641e0dff
-
SSDEEP
6144:5Y9zfajnC6iGm15k66Clhdq8yZXlkV68pr2g1PJbmVhMqu:m9WHm15k66ClHq8yZVypIMqu
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7575) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-