General
-
Target
f584c124d92b09ba12d2538d52300dc38ef255c6ad23c30e7569ff1920388c50.sample
-
Size
333KB
-
Sample
240227-wnd2aafg24
-
MD5
169d9a666d9d56e1c7396cac6591af49
-
SHA1
cb61440e03d74116ce70a23307a600f04bb58eed
-
SHA256
f584c124d92b09ba12d2538d52300dc38ef255c6ad23c30e7569ff1920388c50
-
SHA512
619ec05142929ecc1349a5a68a24953a1877308bedc6c52e698fc379d34b7e4dfb7e07cf5da63547cf26ee4c87fdbac8c75fe325a3c277e0d48dddc8b927013e
-
SSDEEP
6144:Bkv89W2QcboLPlZbqEKvSlvgXCBVnTDg3GV06rPnej63AbyEXq:Bk09XelZbqEKv8gXCBlPHe1yEXq
Behavioral task
behavioral1
Sample
f584c124d92b09ba12d2538d52300dc38ef255c6ad23c30e7569ff1920388c50.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f584c124d92b09ba12d2538d52300dc38ef255c6ad23c30e7569ff1920388c50.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\hu-HU\How_to_back_files.html
Extracted
\Device\HarddiskVolume1\Boot\How_to_back_files.html
Targets
-
-
Target
f584c124d92b09ba12d2538d52300dc38ef255c6ad23c30e7569ff1920388c50.sample
-
Size
333KB
-
MD5
169d9a666d9d56e1c7396cac6591af49
-
SHA1
cb61440e03d74116ce70a23307a600f04bb58eed
-
SHA256
f584c124d92b09ba12d2538d52300dc38ef255c6ad23c30e7569ff1920388c50
-
SHA512
619ec05142929ecc1349a5a68a24953a1877308bedc6c52e698fc379d34b7e4dfb7e07cf5da63547cf26ee4c87fdbac8c75fe325a3c277e0d48dddc8b927013e
-
SSDEEP
6144:Bkv89W2QcboLPlZbqEKvSlvgXCBVnTDg3GV06rPnej63AbyEXq:Bk09XelZbqEKv8gXCBlPHe1yEXq
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7559) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-