General
-
Target
d9de562ac1815bf0baad1c617c6c7f47d71f46810c348f7372a88b296d68cfae.sample
-
Size
335KB
-
Sample
240227-wk2m6sff56
-
MD5
c3d5522f176830c4a24223c96439f668
-
SHA1
46574cd17ee2a1f2084dc83a65df94e13ce25061
-
SHA256
d9de562ac1815bf0baad1c617c6c7f47d71f46810c348f7372a88b296d68cfae
-
SHA512
0ed0510f4bba6280e4319f3742d1775d7d251c35517f74f1e2f7350ac68239879b0171a279aab252947163977f363cf3852d52747b225aa160f882cb82bc532b
-
SSDEEP
6144:1YS9RhUoKV8TCylQ0MWNns5wiSvypQof+9RpfbMPrac6bhMq:1/9T0ylQ0MWNns5xSvyp7W6MMq
Behavioral task
behavioral1
Sample
d9de562ac1815bf0baad1c617c6c7f47d71f46810c348f7372a88b296d68cfae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9de562ac1815bf0baad1c617c6c7f47d71f46810c348f7372a88b296d68cfae.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\How_to_back_files.html
Extracted
C:\Program Files\How_to_back_files.html
Targets
-
-
Target
d9de562ac1815bf0baad1c617c6c7f47d71f46810c348f7372a88b296d68cfae.sample
-
Size
335KB
-
MD5
c3d5522f176830c4a24223c96439f668
-
SHA1
46574cd17ee2a1f2084dc83a65df94e13ce25061
-
SHA256
d9de562ac1815bf0baad1c617c6c7f47d71f46810c348f7372a88b296d68cfae
-
SHA512
0ed0510f4bba6280e4319f3742d1775d7d251c35517f74f1e2f7350ac68239879b0171a279aab252947163977f363cf3852d52747b225aa160f882cb82bc532b
-
SSDEEP
6144:1YS9RhUoKV8TCylQ0MWNns5wiSvypQof+9RpfbMPrac6bhMq:1/9T0ylQ0MWNns5xSvyp7W6MMq
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (5095) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-