Overview
overview
10Static
static
1001aabfaa41...50.exe
windows7-x64
301c647838c...7f.exe
windows7-x64
1002f5c32fa2...d6.exe
windows7-x64
61a05cba687...a3.exe
windows7-x64
101a8f35d0f2...b9.exe
windows7-x64
1af797776e...13.exe
windows7-x64
101b2b369f31...2e.exe
windows7-x64
31b4a0b685c...db.exe
windows7-x64
31b4d73a9a7...89.exe
windows7-x64
101ba8934b2e...4d.exe
windows7-x64
11c2a51daa5...5b.exe
windows7-x64
101c8bc3890f...45.exe
windows7-x64
61ce9fa5304...ef.exe
windows7-x64
1d51d46e07...cd.exe
windows7-x64
101db9ec5678...e0.exe
windows7-x64
101dbbed25cf...88.exe
windows7-x64
1de8054e71...a1.exe
windows7-x64
91e56efa724...ba.exe
windows7-x64
11e754e1c7e...44.exe
windows7-x64
31e8e39da21...bc.exe
windows7-x64
101e9e575dd3...86.exe
windows7-x64
31eb6de09f5...69.exe
windows7-x64
41f0daca3fc...d9.exe
windows7-x64
61f0efbc182...be.exe
windows7-x64
1fd42d07b4...6e.exe
windows7-x64
102a02608130...a1.exe
windows7-x64
12a05ac3c43...e4.exe
windows7-x64
102a32c84488...95.exe
windows7-x64
102a6c920bfb...dc.exe
windows7-x64
32aebddfd22...c8.exe
windows7-x64
32b245f773b...bb.exe
windows7-x64
102b331aa02a...b7.exe
windows7-x64
10General
-
Target
002.7z
-
Size
11.2MB
-
Sample
240713-lf7nhsvgrp
-
MD5
82180da2d9ecde4947a618ff1a37fdad
-
SHA1
ae327ea9229498e86afb337b87cf6d6f4caaa309
-
SHA256
cc65535243dfd3cd54a9c5ecfcb93c7f918a87c725e9c52925017ab92effe278
-
SHA512
606ddfb833eb38952403ae10e9eec694d45e3fb2df326d5825f93257d605552868343e80fd6e3a497d690dabe8ed1493b60843118f1aa5412be8cc55a66335a3
-
SSDEEP
196608:nYcNyJpHBLBc6gKWYZzbK26sqaddXpgPxydfcNQChzHayMxpJ51LipiFe5TZD0B:n5yJ1pB+KWYtbK26sq25GyxcR6yMt51L
Static task
static1
Behavioral task
behavioral1
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
1a05cba6870798d2e73001bf872e4d579460c380c060fd051f33a703f504b8a3.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
1a8f35d0f2b1a11a5b30e6f05ee5c9e93542fc2f559f8e66cf67f2a1b6ccbeb9.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
1af797776ec72874e6519962a5cfa3cd64c6061270774f7278755c69333a0813.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
1b2b369f31591f5c8cee55fd278c3d8a676b827d35737eb59b4d85e2b5d9be2e.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
1b4a0b685c317d6032beb3e82660bc57e0bf2dfac99e9d3be2cf3bfe78e976db.exe
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
1b4d73a9a7c6d2163e7378c97f01fed223be9daa6acb71c81b11491907473f89.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
1ba8934b2e8a41efed574f3bf16e3d754daf254fcae9ed658d9eca51529fa34d.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
1c2a51daa50a0489a8734d3577b43bcaf78f32ab34a404d2f6026af5ed33cd5b.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
1c8bc3890f3f202e459fb87acec4602955697eef3b08c93c15ebb0facb019845.exe
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
1ce9fa530436fed6a2cc1bab08320ff7b1ebdc8d80545bd298af8260535cdcef.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
1d51d46e07d1aaaf34b8b43371bb71aa87812b226341944ab661c286e66de4cd.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
1dbbed25cf831114c926933b2cff5b4a4760dd95c7618f01cf5b27deec7b1788.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
1de8054e71f00406e617230fc22017bfd66c78b216a57cec085ca6a5cb2f24a1.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
1e56efa7243a1d6456e47a8736751a3e338c837a1f1e27da3ca804544df41fba.exe
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
1e754e1c7e081ae1e7701ba45c80ca4156d41d958158384a368047f3a6921044.exe
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
1e8e39da21c7cf3c81528389a1e8bceac78993bfea33bfccbd0280953b5011bc.exe
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
1e9e575dd30aa68e8cf8ff04cc591d429cdf1e09c3386e68d4cfb076dc997386.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
1eb6de09f5895458aefa5a1e603df84e403d54e00d5a07fa90a23dd850c7b069.exe
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
1f0daca3fc222298b58d0a81333fb6875fbe1b7ab77c98d2c37c3e026a27b7d9.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
1f0efbc1828ca978f4db5d847ccae5044c27c8efa266a71289f0d824035d44be.exe
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
1fd42d07b4be99e0e503c0ed5af2274312be1b03e01b54a6d89c0eef04257d6e.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
2a02608130d8a74a6f641132c071bed4cf0bf0838dc0f53fcdf807fc851818a1.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
2a05ac3c433bcf896be4cf984b0ea5ea41006f2421cb4a4926d5eaaed6cf37e4.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
2a32c844885b05e65769a051dae825aecef887c2c60035e5a20ae42533cc1695.exe
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
2a6c920bfb1259524d8e4e89c5408fd67c6fcfd2803b7a6c6dfbc9b86093a5dc.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
2aebddfd22ccb317b35b54e627d0eb05c59e761edbabe2a5029b19e8866e03c8.exe
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
2b245f773b616b41fc7eb3026a5216e1b792a32ef2e833800e2f3b300b3498bb.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
2b331aa02af211be4b0491a173e17e09993f5d0a1900271b97b41daae740aeb7.exe
Resource
win7-20240704-en
Malware Config
Extracted
C:\Users\ooxlOmJxX.README.txt
lockbit
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion.ly
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion.ly
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion.ly
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion
https://gdpr.eu/what-is-gdpr/
https://gdpr-info.eu/
Extracted
C:\Users\How To Restore Your Files.txt
darkside
Extracted
C:\Program Files\Java\jdk1.7.0_80\db\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\Users\Admin\Documents\Fucking_it.txt
3LrDFbp6fRqkXE45bLipnrQNg9wMKyTR5S
https://t.me/usnexushacker
https://www.propub3r6espa33w.onion
Targets
-
-
Target
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
-
Size
155KB
-
MD5
7e3b2b10d66955465c12da9f2ab43e36
-
SHA1
2ee3d7ce4ec3461026e910fdfcf9d18dd43eb380
-
SHA256
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550
-
SHA512
ce37aff2e2aba9d6434454e17bafeebc47e9d86a716fcd9732bc03bf6484c4b6428d43322279b9273c3e5386ce924853d3aebf90178b2fa5009d63e1defd47a0
-
SSDEEP
3072:l5K/B0toLuSNJilZHQsozTS+SMqqDL2/TrKLOG:lcytw7a1yTS+xqqDL6HKL
Score3/10 -
-
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
-
Size
79KB
-
MD5
f9afb31bc17811e5ab4fa406f105b1fe
-
SHA1
d1a9449dcc8a3aa0c887bce71f128866175f679a
-
SHA256
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f
-
SHA512
6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55
-
SSDEEP
1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (189) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
-
Size
70KB
-
MD5
58d6eab3aafd9139a2f1c7606ecd4cef
-
SHA1
4152a7431b3d5dd8b0f6ad08148cb166315f41e9
-
SHA256
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6
-
SHA512
ae92012d8401c886cb898ac0134db1567aaefb467d04d7afdb4e3e6b390b929dc353467d55b8cce5f3c74c942ac79ce565c172e296468ac44b3d8bd730a52c49
-
SSDEEP
1536:ZZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:wd5BJHMqqDL2/Ovvdr
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
1a05cba6870798d2e73001bf872e4d579460c380c060fd051f33a703f504b8a3.exe
-
Size
92KB
-
MD5
786ce74458720ec55b824586d2e5666d
-
SHA1
6f62e7fe75a0876939e0dd95d314b83e25e1e395
-
SHA256
1a05cba6870798d2e73001bf872e4d579460c380c060fd051f33a703f504b8a3
-
SHA512
083fe6cde08dac05043ecc0fdbc8b26b0764de7f651ad19e96a937bc27de96242f1763b701b308eab7e0b9a8dd88cbc45e9c891de505b5348581acd4e1495c33
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4A9eAzVbobr+t+NK1GcoDc50cO2tqpbe:Qw+asqN5aW/hL2UVEnHKIcAtcO2tqpb
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (317) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
-
-
Target
1a8f35d0f2b1a11a5b30e6f05ee5c9e93542fc2f559f8e66cf67f2a1b6ccbeb9.exe
-
Size
92KB
-
MD5
a23219bddf6b154ca2f5afa89cb2b0c3
-
SHA1
0d63eb57023770b53b6b31f669a03bbdb7a2465b
-
SHA256
1a8f35d0f2b1a11a5b30e6f05ee5c9e93542fc2f559f8e66cf67f2a1b6ccbeb9
-
SHA512
65583cfa9c2d77330e15a5bfce430831b53bf1b018757fa8778618bef44b87b15d20a9bbcd80a1526bb6c582df3b8ff55f0cc7b002c4a1655c3f1ace01d54172
-
SSDEEP
1536:tBwl+KXpsqN5vlwWYyhY9S4AYgfEHB0tRYn+9jsGGqbg8IIvoBec5wOmh:Hw+asqN5aW/hLmDHyt0KaIvogn
Score1/10 -
-
-
Target
1af797776ec72874e6519962a5cfa3cd64c6061270774f7278755c69333a0813.exe
-
Size
2.0MB
-
MD5
fa06e6aadef2365052156f12c92d7b09
-
SHA1
82de91795547028be327e75cee0fdf082352bfc9
-
SHA256
1af797776ec72874e6519962a5cfa3cd64c6061270774f7278755c69333a0813
-
SHA512
1629a2d234c70e7f1f5927b5a816c80b9fb2c995b4b334ff994848d3c7fe1c8797b231c4baaa63ca1e837081e9859c3ca138cd76a1db314c6b98685f5489566e
-
SSDEEP
24576:a5SndG2iSNjN2w9Os9cRfO/d8mT6c6aVqwPhUMelU+V:aMfJqsgXmgyJPE
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
-
-
Target
1b2b369f31591f5c8cee55fd278c3d8a676b827d35737eb59b4d85e2b5d9be2e.exe
-
Size
155KB
-
MD5
f70cabb50328b089d00f82808f7e2563
-
SHA1
9fd6765c2a42120042dd437fcb4468a448c64725
-
SHA256
1b2b369f31591f5c8cee55fd278c3d8a676b827d35737eb59b4d85e2b5d9be2e
-
SHA512
baf5abd87d7267d1b89b9779c2781604bbcdba40afab2fe4e43bd6ddb0500c89f3502a879503d6b0303da2aa169420cbd8e3ca7c85efa8604b127171c6234cec
-
SSDEEP
3072:S5K/B0toLQSNJwlxwsx89TSdBgjMqqDL2/TOKyRGA:ScytwtLTTSdBgQqqDL6SKNA
Score3/10 -
-
-
Target
1b4a0b685c317d6032beb3e82660bc57e0bf2dfac99e9d3be2cf3bfe78e976db.exe
-
Size
432KB
-
MD5
7da83e0a63039ac6aec5b8cbc31d20d6
-
SHA1
6b1d7db9600cc88922b9a213f7b30f29fe5bc20e
-
SHA256
1b4a0b685c317d6032beb3e82660bc57e0bf2dfac99e9d3be2cf3bfe78e976db
-
SHA512
f988d36e9e67b2c8ef70968edd3de817614cf20a3a6041d77c627501186b36b4a6904e51acce876f772f0593975af1d2e50e882ba562a79c24a2ee6e1b5f0ac6
-
SSDEEP
12288:iKPmrLbovqk0kQkM0k0k40k0k0kikckyk0kgVa:iKPSi
Score3/10 -
-
-
Target
1b4d73a9a7c6d2163e7378c97f01fed223be9daa6acb71c81b11491907473f89.exe
-
Size
490KB
-
MD5
2d23c83d6941cf484da19d4367c02df0
-
SHA1
b63dd1f2e35d8944dee745321643f06037dfe95e
-
SHA256
1b4d73a9a7c6d2163e7378c97f01fed223be9daa6acb71c81b11491907473f89
-
SHA512
28a5d2df80e9a1c5eeb65938479b7b96f754feff28244f91304361bd4c238d533f01d37598eedc95c6549c9066c8f15b2ce16262e02ce944dd47ed6e123ef797
-
SSDEEP
12288:wIOfQgbI1D/Tj7MACdotmELTtqGJouy9JtsmRrTNaTI7rERFUZ1K1s9L01:rt0v4yPpS
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
-
-
Target
1ba8934b2e8a41efed574f3bf16e3d754daf254fcae9ed658d9eca51529fa34d.exe
-
Size
362KB
-
MD5
2e81a8097ac6d1902db1f74863b41c39
-
SHA1
4b3a78491246f78566ec444a1c22226746a53a21
-
SHA256
1ba8934b2e8a41efed574f3bf16e3d754daf254fcae9ed658d9eca51529fa34d
-
SHA512
bcf78e32b58e559bc06067aa360630e6ac85cb9b1f120580b93c2c1e3ae051590eb406c8650bee122970d105e3359f27e6f85b2dd60da2c69ea762dc2c600b49
-
SSDEEP
6144:siW7SDayqQXtokkfP6MyMQZVHewrBtM70H4dy/lrDJYgQ1qUbfc:liwdvmqVxrrlrDygfV
Score1/10 -
-
-
Target
1c2a51daa50a0489a8734d3577b43bcaf78f32ab34a404d2f6026af5ed33cd5b.exe
-
Size
159KB
-
MD5
ef577a1a486aa3dba1b0acd46b54d3a6
-
SHA1
24897bc96bec3126c4a65c96b907fe57bd75359f
-
SHA256
1c2a51daa50a0489a8734d3577b43bcaf78f32ab34a404d2f6026af5ed33cd5b
-
SHA512
9aae8575f067614dc9bb64c3d7ac604693500922780ae81a60d7cbcee91c3c12f9e20c7fdaf9a665a58e9c314cd4c185925719bc29ae2b702879d770a2a39e39
-
SSDEEP
3072:JuJ9OlKolUa1U197bzhVsmftsu3ieOfNqv1wxfs3Q0hU:Jufj0zi1dNVsmftSyyxU3Q0e
Score10/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
1c8bc3890f3f202e459fb87acec4602955697eef3b08c93c15ebb0facb019845.exe
-
Size
179KB
-
MD5
c2fea37aa19c947614c20fe2ad3aeef2
-
SHA1
16834915e3db38b5b954c2099d77bcb700428588
-
SHA256
1c8bc3890f3f202e459fb87acec4602955697eef3b08c93c15ebb0facb019845
-
SHA512
e5d86b7d03c3428c59b0d0bc7e57089abc8dc8baf3dd9dde47852c43ede1e48804851cfb3ed018121b78248f8e75ed7049ea8b2d6ed6303df36514a016e98e59
-
SSDEEP
3072:ZTO/rWaQcrcfX25Qs9jRzj/rvV9Yecqj3:tO/rWayXIFVj/rvV9B
Score6/10-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
-
-
Target
1ce9fa530436fed6a2cc1bab08320ff7b1ebdc8d80545bd298af8260535cdcef.exe
-
Size
1.2MB
-
MD5
f645b68f97b49c8d120158e7fd7f1460
-
SHA1
b8673e2041966ace9d643106ba2aa1e69c3b9cd7
-
SHA256
1ce9fa530436fed6a2cc1bab08320ff7b1ebdc8d80545bd298af8260535cdcef
-
SHA512
685594d277c7d09649fa5b3b0d363714f524be0116cdedab92b5f617e41c7a40573055f1d20d85eb629feb9e55d324a06e9e6ed7297a78d179108c4f7e57eb36
-
SSDEEP
24576:ZBUIKn/vwOXGUXAjCymYZiVtElVIBT2roqnTSSxWeT/BRPOO8xGKUq7:F0dwAYZt6C31WeT5RPOhxzUq7
Score1/10 -
-
-
Target
1d51d46e07d1aaaf34b8b43371bb71aa87812b226341944ab661c286e66de4cd.exe
-
Size
6.4MB
-
MD5
356388cdb4f74188812fa44c0aef000b
-
SHA1
59130f7b2e63422da6f620fa29cc6837903584cb
-
SHA256
1d51d46e07d1aaaf34b8b43371bb71aa87812b226341944ab661c286e66de4cd
-
SHA512
11ba99f6a151675408f76f4c02d10a80a60f74d6c4e0ef794043d36237b002cf8ab577421758f16fe678f1f190782aba7adbdf33c87693c379dd18e3176dae83
-
SSDEEP
98304:f/qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8jHI:f/qPe1Cxcxk3ZAEUadzR8jHI
Score10/10-
Executes dropped EXE
-
Drops file in System32 directory
-
-
-
Target
1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe
-
Size
2.4MB
-
MD5
84e2bf751724e3b0acc70b67ee1b8e96
-
SHA1
2e1c9638b022901d67c69ef17c6acd12fd6e493f
-
SHA256
1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0
-
SHA512
56a229897c812cddd7f0b1847cf439f910350aa11138f7165b7c7f697095dfe5ee64e875e4262706c20e7bdbb59a94512386965e83ac9327b0b6967377882aef
-
SSDEEP
12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCp:eEtl9mRda12sX7hKB8NIyXbacAfe
Score10/10-
Modifies WinLogon for persistence
-
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
-
-
Target
1dbbed25cf831114c926933b2cff5b4a4760dd95c7618f01cf5b27deec7b1788.exe
-
Size
92KB
-
MD5
a3435d1839ded089f36516c52e94f5d3
-
SHA1
ffa7bf12d73d61c7cd09070f2d680c1b0eec4990
-
SHA256
1dbbed25cf831114c926933b2cff5b4a4760dd95c7618f01cf5b27deec7b1788
-
SHA512
b3bf2296104cff14836cac3391cb12ee1ca9055673f2855bee45f552bcaf085053d1504ad5d141620e7f4a50ee407bbd8db2844cb32747cb5631efd2daaccd86
-
SSDEEP
1536:tBwl+KXpsqN5vlwWYyhY9S4AwGOFr82UvQJwK:Hw+asqN5aW/hLe3rrJw
Score1/10 -
-
-
Target
1de8054e71f00406e617230fc22017bfd66c78b216a57cec085ca6a5cb2f24a1.exe
-
Size
112KB
-
MD5
b6cfdefd2ef6bb507cbac8634ec3f6a1
-
SHA1
583bbf424a7114586dd48fe57be999cbd750ba56
-
SHA256
1de8054e71f00406e617230fc22017bfd66c78b216a57cec085ca6a5cb2f24a1
-
SHA512
5b8ea7112f2f5ef2f34ac18b9ce8b3afc0016c4603fe222a02a8fc03e115890bcdb4929db273026aded00aa8a226cd49c2b5cd1279086aea049c13ae7608f5e1
-
SSDEEP
1536:R2HSDWrKs9S4AZvJHU4mKQvXqWJLsYfgIXE0FtRhSH0SJE3PpgNmKRUM:RjaWP3vQNJLsUE03RA1eP87
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (317) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
1e56efa7243a1d6456e47a8736751a3e338c837a1f1e27da3ca804544df41fba.exe
-
Size
16.0MB
-
MD5
3031071c4a4b9c780bcc794fecf5c62b
-
SHA1
8249394839971405c3193a47fa8defdd2f7e6945
-
SHA256
1e56efa7243a1d6456e47a8736751a3e338c837a1f1e27da3ca804544df41fba
-
SHA512
1233e6bcb7ae1d6f5d3ea5eac7eab0486728a7a588686b5a40560a4759669d308998c76821db106b9fb22e44fb5448ab2b51c7136498e335ac55dc0bfb19d9e5
-
SSDEEP
3072:S5K/B0toLOSNJvlxwsx89TSdBgjMqqDL2/TOKeHXGl:Scytwb+TTSdBgQqqDL6SKS2
Score1/10 -
-
-
Target
1e754e1c7e081ae1e7701ba45c80ca4156d41d958158384a368047f3a6921044.exe
-
Size
155KB
-
MD5
bface344d14f9503aab7e59a99db6124
-
SHA1
9d4e54f418f78ff7f068aeb80e6fa6dc1ac174d2
-
SHA256
1e754e1c7e081ae1e7701ba45c80ca4156d41d958158384a368047f3a6921044
-
SHA512
71406823116eadc26a3ea3c05f6d19aa0f000cd09fd402861bcf827607ae09bce6315e7572cbfca2e897b1c8962f9628cd3f71ce38a9d3156279b354bea6c0b9
-
SSDEEP
3072:l5K/B0toLQSNJklZHQsozTS+SMqqDL2/TrKG+G:lcytwtQ1yTS+xqqDL6HKS
Score3/10 -
-
-
Target
1e8e39da21c7cf3c81528389a1e8bceac78993bfea33bfccbd0280953b5011bc.exe
-
Size
564KB
-
MD5
99cc504910231308cd759c3c0b1a00ac
-
SHA1
f884e5fcd3da589a0ee6036cb970e704cf511599
-
SHA256
1e8e39da21c7cf3c81528389a1e8bceac78993bfea33bfccbd0280953b5011bc
-
SHA512
8f35a7c7d7708f8a04755560e0b672bda1744580b2d62337408cac6c3803ea4aa1c8a8894d57c9cf6aba10600456431956e230db07fe4a974ae337fedc08ea8e
-
SSDEEP
3072:9Ry5r313/OQi2YcRVm16Pn6h0Hxq1MSp9i2YcRPm16Pn6ckC1jEyE9a5Zt1pDrQs:AJ3XiWm16mW6biym16rtCiym168
Score10/10-
Chaos Ransomware
-
-
-
Target
1e9e575dd30aa68e8cf8ff04cc591d429cdf1e09c3386e68d4cfb076dc997386.exe
-
Size
155KB
-
MD5
7c693f1b689200dfa293bc59c8d2ad9d
-
SHA1
ab7154a7d8e589bb91d19cb40a971667ff1b47f3
-
SHA256
1e9e575dd30aa68e8cf8ff04cc591d429cdf1e09c3386e68d4cfb076dc997386
-
SHA512
03ccde57d1a101508a9e7a55051bdf0869a866085ac1746b54f915883f31c4f371c2f293f068390458ac4b94ccf72bbc5fc9dbdf5e6979cc9276132693739838
-
SSDEEP
3072:S5K/B0toL1SNJ5lxwsx89TSdBgjMqqDL2/TOKu5G:ScytwogTTSdBgQqqDL6SKd
Score3/10 -
-
-
Target
1eb6de09f5895458aefa5a1e603df84e403d54e00d5a07fa90a23dd850c7b069.exe
-
Size
17KB
-
MD5
f956092a030e34b7d7b471383ce7e52a
-
SHA1
de678ee647b172c134134ce953ad386f6e5e4021
-
SHA256
1eb6de09f5895458aefa5a1e603df84e403d54e00d5a07fa90a23dd850c7b069
-
SHA512
a557b4ba5da1c964e04601a1de604becd8957c07000a901c04779d956236c7e40de4332bb9473dc0f87be0c417407da1026594202c8d23ac5c69b9002f6a4c71
-
SSDEEP
384:1duTZHnVcaI2r4BCTXZhtam11fTgC01p1Xx99zzWMQhW3WMv5:1du9CaxEovcm/BCvXcO5
Score4/10 -
-
-
Target
1f0daca3fc222298b58d0a81333fb6875fbe1b7ab77c98d2c37c3e026a27b7d9.exe
-
Size
70KB
-
MD5
4b1923e619b4a9e1f7a64358a1ac2de3
-
SHA1
fa50e0e19dd1dfedcf5fb23c709c60cb8f78accc
-
SHA256
1f0daca3fc222298b58d0a81333fb6875fbe1b7ab77c98d2c37c3e026a27b7d9
-
SHA512
c5b96fbfc6a4f0cf29b200a2d9682f51251ecfcc6ebfe12e04393473c57c82b1d08e474db5322d20069f6aef6223db379d114f92e39e403762ab302313c2a6de
-
SSDEEP
1536:GZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:1d5BJHMqqDL2/OvvdrH
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
1f0efbc1828ca978f4db5d847ccae5044c27c8efa266a71289f0d824035d44be.exe
-
Size
178KB
-
MD5
53bd35774b8d36830b5bee75acf375b2
-
SHA1
c3a26e55ca87614b1eb94975d73aa39979654322
-
SHA256
1f0efbc1828ca978f4db5d847ccae5044c27c8efa266a71289f0d824035d44be
-
SHA512
bcd8e164896972d46ebf325af3d1d10451a897eb3221a8cfc5191023b2b1512034f9945efc2326f21170ce241a46718dda069ce19cce8ecc8af4047cec6346d3
-
SSDEEP
3072:b5BZ6q9elWNIG+9tv+9q9tBFKfpYnmig3/Vl0hpVervREDLUYwEx4:lBZ6q9Ju3HFKDi3pOeLb4
Score1/10 -
-
-
Target
1fd42d07b4be99e0e503c0ed5af2274312be1b03e01b54a6d89c0eef04257d6e.exe
-
Size
14.9MB
-
MD5
97abffeaa7bdfaa81532bd6028498225
-
SHA1
26ab576a0abf7085ecf6321a311a7b3088ee48ae
-
SHA256
1fd42d07b4be99e0e503c0ed5af2274312be1b03e01b54a6d89c0eef04257d6e
-
SHA512
af271b15a4f64ac4965cc75f7531e28d3ea0abc90d16ae4654251a301d1a3a0b10d80b205dc626b8866c976ffacdace74f71711c73ef1240d867aeb09c47cc75
-
SSDEEP
196608:aMygJ9edfbhSo5Kp8qPKlL8QgYVhqhOM8qTsSqwLM:7XJ9e1wo548qSV5VhKOeTsRwLM
Score10/10-
Renames multiple (1055) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
2a02608130d8a74a6f641132c071bed4cf0bf0838dc0f53fcdf807fc851818a1.exe
-
Size
362KB
-
MD5
f9951f5e40c21a78a631ab7b4a60ba89
-
SHA1
5d73c066e1ba881f038c049fbafcb28070b4fe26
-
SHA256
2a02608130d8a74a6f641132c071bed4cf0bf0838dc0f53fcdf807fc851818a1
-
SHA512
96a4c3387636971511cc1146fc5e9c9a454a98e3f1cdb52e52127a565171aa4977f041efd15f2eb8f268bf6138c23b0a061025339acb8f66ba5a1f41d3e12024
-
SSDEEP
6144:UeyWvDVBSuFPRxMmcAk/eP8ph6sy4oV9bisv9tvX4FO/5VdPFMBWQRq+MCS:RyADhzveeP8p89dvn5VdPacbhR
Score1/10 -
-
-
Target
2a05ac3c433bcf896be4cf984b0ea5ea41006f2421cb4a4926d5eaaed6cf37e4.exe
-
Size
205KB
-
MD5
5e9e6b90b530260d1f6dd462a9a2fa16
-
SHA1
3caa6e6d2aed85b9ea046a077a972c2a1718ee7b
-
SHA256
2a05ac3c433bcf896be4cf984b0ea5ea41006f2421cb4a4926d5eaaed6cf37e4
-
SHA512
2a0e6f2687e3bbb4158ce7bfc46b1c86794cb23fdbb041d0e5735b0e2674a9b27259edee3044e58202528e72e6c1b2ab6c4f7aeabb193f9d7f48b5bb60211f62
-
SSDEEP
6144:+B4Fr9NzqHW7V5V9w/UIRZizI1aqebq/lsyp:+B45qHW7nU/pZmiXqy
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (206) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
-
-
Target
2a32c844885b05e65769a051dae825aecef887c2c60035e5a20ae42533cc1695.exe
-
Size
959KB
-
MD5
2525d5867b27f5ee3949880186c35ed7
-
SHA1
8fc6dd893d10eb3f4d7c06fda1d3e05a8c7ba8ad
-
SHA256
2a32c844885b05e65769a051dae825aecef887c2c60035e5a20ae42533cc1695
-
SHA512
589b76ae5cddff763af93164eb817cf971a3a137a7d3a6ad6ac8c3dfcb703c49c13afb69c00d1984edbfeecc63cdefa4a6b78e1c70f6b65fb057e0e82c526376
-
SSDEEP
24576:uLjr3s2nScu1i1tz3f++5kRzFxk7rMxNeR1R9qpdRF:Ujrc2So1Ff+B3k796r
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
2a6c920bfb1259524d8e4e89c5408fd67c6fcfd2803b7a6c6dfbc9b86093a5dc.exe
-
Size
432KB
-
MD5
d600d6c7d26ddb9f4aa0f0474aba5cc4
-
SHA1
a0944d3cef8e03dcb71025c1ab5b6c6bfb638789
-
SHA256
2a6c920bfb1259524d8e4e89c5408fd67c6fcfd2803b7a6c6dfbc9b86093a5dc
-
SHA512
888602f9b88bfcd99c56bca2d80541f6bf423f5530983360854a9a5bf27bddf6251f5bf9175705eb2898294898dbd0ad79b354c4c7e4f746f84807308c49f510
-
SSDEEP
12288:iKPmrLeovqk0kQkM0k0k40k0k0kikckyk0kgVa:iKPSV
Score3/10 -
-
-
Target
2aebddfd22ccb317b35b54e627d0eb05c59e761edbabe2a5029b19e8866e03c8.exe
-
Size
196KB
-
MD5
18c062ae3a545ade59842cafe5b17ea8
-
SHA1
0bf7e78f698eabe7811629e12052493401bc7095
-
SHA256
2aebddfd22ccb317b35b54e627d0eb05c59e761edbabe2a5029b19e8866e03c8
-
SHA512
480584079e8cb3a6f8d9010c12348d6969a423c667e8576f6f984d3b4395aff163ef0e2a0cb01785ab8bb0d14d8fe22a5b16f55a0907e489af875fb16324e2ef
-
SSDEEP
3072:z+PkbTWYtBzNgnbRh6JuB/fnDkjjdqxEIezD91+UB77:6s2cBCbRdB/fnDkjXIuRx7
Score3/10 -
-
-
Target
2b245f773b616b41fc7eb3026a5216e1b792a32ef2e833800e2f3b300b3498bb.exe
-
Size
2.4MB
-
MD5
1aaee486a62300dd74c2d236a4945527
-
SHA1
0a22357d6c3ccf5a3a5dbabf6e7ad874e97c1b46
-
SHA256
2b245f773b616b41fc7eb3026a5216e1b792a32ef2e833800e2f3b300b3498bb
-
SHA512
27f681dadcab2646c3e831af145c2faac9b9265a46f3b027f9824519a9ba60912b277b4bfb90aa3d9fe989961667019353af09546bfdd0b850d656323df47643
-
SSDEEP
12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCG:eEtl9mRda12sX7hKB8NIyXbacAfh
Score10/10-
Modifies WinLogon for persistence
-
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
-
-
Target
2b331aa02af211be4b0491a173e17e09993f5d0a1900271b97b41daae740aeb7.exe
-
Size
5.0MB
-
MD5
e868a305cfda3903526adc37daf56e6d
-
SHA1
11148b1bafb29ffbd30ab3eccc88de9648b756a8
-
SHA256
2b331aa02af211be4b0491a173e17e09993f5d0a1900271b97b41daae740aeb7
-
SHA512
bcb38bdb1faf2ef6a112e2f63c06d8423f649939f074228a78ff72f80abe313e9238801a059a3a931523157ac7ce71b52f49cb30fb7de5f4f3125fa7556c7b15
-
SSDEEP
98304:YDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:YDqPe1Cxcxk3ZAEUadzR8yc4
Score10/10-
Contacts a large (3189) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
4