General
-
Target
artifact.bin
-
Size
146KB
-
Sample
240917-cpm6sszepp
-
MD5
d5c43db682644a7c08e653206f9c8d73
-
SHA1
3df0d727a4ebd48c2f9a1012828a47271c1e4a1c
-
SHA256
c31a2e594ba6f814f266ff511659faa3489b5508187693048e0ff17bc087bb7b
-
SHA512
f800f0320128091b3eac64f5f7e41d425ce20be0f0b3d5ff36c35843b4212a71e9c2cc6359e3373db179317c825c84848b299145d4928b04a7cdfd5611e8c7ef
-
SSDEEP
3072:p6glyuxE4GsUPnliByocWepsXU3tITJ9GN+YVF:p6gDBGpvEByocWesUgfGN+YVF
Behavioral task
behavioral1
Sample
artifact.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
artifact.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
artifact.bin
-
Size
146KB
-
MD5
d5c43db682644a7c08e653206f9c8d73
-
SHA1
3df0d727a4ebd48c2f9a1012828a47271c1e4a1c
-
SHA256
c31a2e594ba6f814f266ff511659faa3489b5508187693048e0ff17bc087bb7b
-
SHA512
f800f0320128091b3eac64f5f7e41d425ce20be0f0b3d5ff36c35843b4212a71e9c2cc6359e3373db179317c825c84848b299145d4928b04a7cdfd5611e8c7ef
-
SSDEEP
3072:p6glyuxE4GsUPnliByocWepsXU3tITJ9GN+YVF:p6gDBGpvEByocWesUgfGN+YVF
-
Renames multiple (4110) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-