Overview
overview
10Static
static
10The-MALWAR...om.exe
windows7-x64
10The-MALWAR...om.exe
windows11-21h2-x64
10The-MALWAR...nt.exe
windows7-x64
The-MALWAR...nt.exe
windows11-21h2-x64
The-MALWAR...ot.exe
windows7-x64
The-MALWAR...ot.exe
windows11-21h2-x64
The-MALWAR...re.exe
windows7-x64
7The-MALWAR...re.exe
windows11-21h2-x64
7The-MALWAR...ry.exe
windows7-x64
10The-MALWAR...ry.exe
windows11-21h2-x64
10The-MALWAR...0r.exe
windows7-x64
10The-MALWAR...0r.exe
windows11-21h2-x64
10The-MALWAR...as.exe
windows7-x64
1The-MALWAR...as.exe
windows11-21h2-x64
3The-MALWAR...ou.exe
windows7-x64
1The-MALWAR...ou.exe
windows11-21h2-x64
3The-MALWAR...MZ.exe
windows7-x64
6The-MALWAR...MZ.exe
windows11-21h2-x64
6The-MALWAR...er.exe
windows7-x64
3The-MALWAR...er.exe
windows11-21h2-x64
The-MALWAR...LL.exe
windows7-x64
1The-MALWAR...LL.exe
windows11-21h2-x64
1Analysis
-
max time kernel
1460s -
max time network
1479s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-10-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Ransomware/NoMoreRansom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Ransomware/NoMoreRansom.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Ransomware/PowerPoint.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Ransomware/PowerPoint.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Ransomware/RedBoot.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Ransomware/RedBoot.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Ransomware/Rensenware.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Ransomware/Rensenware.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Ransomware/WannaCry.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Ransomware/WannaCry.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Ransomware/WannaCrypt0r.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Ransomware/WannaCrypt0r.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Trojan/Gas.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Trojan/Gas.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Trojan/LoveYou.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Trojan/LoveYou.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
win11-20241023-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Trojan/PCToaster.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Trojan/PCToaster.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Trojan/TaskILL.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Trojan/TaskILL.exe
Resource
win11-20241007-en
General
-
Target
The-MALWARE-Repo-master/Trojan/LoveYou.exe
-
Size
22KB
-
MD5
31420227141ade98a5a5228bf8e6a97d
-
SHA1
19329845635ebbc5c4026e111650d3ef42ab05ac
-
SHA256
1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71
-
SHA512
cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7
-
SSDEEP
384:o4LBivz/4RHCxN3IBUDzfGWCw2cKgDwg7dEsL9s+cLUoHl:o4LBu74Ro9ImnfGWJ2cKgsgZDW+cLUe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LoveYou.exe