General
-
Target
5df80f40ad8f77e7574e4dda1629ed60N.exe
-
Size
333KB
-
Sample
240813-k6zvxsveqg
-
MD5
5df80f40ad8f77e7574e4dda1629ed60
-
SHA1
4c8b592fc446d284d8eb764d22bbdd16bf32e126
-
SHA256
b0c29ba285c7b4c5ff41831278822437bcb05dee70d4cac7f0d1965eddd4fa79
-
SHA512
c12589221a91b8f7172b0356b7217afff1c20a50c381df02beb631cb06daef87090e1d971c8e2324d3ed45aaa2fd1beb4599f232389c1a088e146ad8e0176401
-
SSDEEP
6144:YemY9cZrt2pF+M9htFl/1M0lpj9G/OaZE8AvInatk1:/9cm+M9vFl/1HrN2natk1
Behavioral task
behavioral1
Sample
5df80f40ad8f77e7574e4dda1629ed60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5df80f40ad8f77e7574e4dda1629ed60N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\How_to_back_files.html
Extracted
C:\Program Files\How_to_back_files.html
Targets
-
-
Target
5df80f40ad8f77e7574e4dda1629ed60N.exe
-
Size
333KB
-
MD5
5df80f40ad8f77e7574e4dda1629ed60
-
SHA1
4c8b592fc446d284d8eb764d22bbdd16bf32e126
-
SHA256
b0c29ba285c7b4c5ff41831278822437bcb05dee70d4cac7f0d1965eddd4fa79
-
SHA512
c12589221a91b8f7172b0356b7217afff1c20a50c381df02beb631cb06daef87090e1d971c8e2324d3ed45aaa2fd1beb4599f232389c1a088e146ad8e0176401
-
SSDEEP
6144:YemY9cZrt2pF+M9htFl/1M0lpj9G/OaZE8AvInatk1:/9cm+M9vFl/1HrN2natk1
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7518) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-