General
-
Target
Funny.zip
-
Size
204B
-
Sample
240921-sesxasyarc
-
MD5
78ca6400451f230898581fa40330618c
-
SHA1
e5d755d9d0475e87c1ec0c4a2d76282f5a365783
-
SHA256
0dd33d2fed9c733e035579c375fb6f7c418af4e07933e18526208669471d918d
-
SHA512
88e86944086fd9602bba8e3638344c3c822dc9518cf0c03370289764919f5dc2aa28f97c5fd9a1d1599563c44cc803298bd27e84faa82a0150c794e38f8da616
Static task
static1
Behavioral task
behavioral1
Sample
Funny.zip
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
Funny.zip
-
Size
204B
-
MD5
78ca6400451f230898581fa40330618c
-
SHA1
e5d755d9d0475e87c1ec0c4a2d76282f5a365783
-
SHA256
0dd33d2fed9c733e035579c375fb6f7c418af4e07933e18526208669471d918d
-
SHA512
88e86944086fd9602bba8e3638344c3c822dc9518cf0c03370289764919f5dc2aa28f97c5fd9a1d1599563c44cc803298bd27e84faa82a0150c794e38f8da616
Score10/10-
Renames multiple (897) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-