Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10ca6ec46ee9...52.apk
windows7-x64
3calc.exe
windows7-x64
7ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...68.exe
windows7-x64
7cd2d085998...-0.dll
windows7-x64
8cdffb7e75b...ss.exe
windows7-x64
3cf7382c25a...c9.exe
windows7-x64
6cgi19-alpt...e_.exe
windows7-x64
7chrst.exe
windows7-x64
3ci05l2a.exe
windows7-x64
cl.exe
windows7-x64
7clean.exe
windows7-x64
3coinvault.exe
windows7-x64
9com_loader.exe
windows7-x64
3csrss.ex_.exe
windows7-x64
6d.exe
windows7-x64
3d0a5cfec8e...B3.exe
windows7-x64
7d0a5cfec8e...A6.exe
windows7-x64
7d2164cdbc9...FB.exe
windows7-x64
3d2164cdbc9...08.exe
windows7-x64
7d4439055d2..._1.dll
windows7-x64
3d54d2a216e...96.exe
windows7-x64
7d5f29750a8...c5.apk
windows7-x64
3d6c32b0146...4d.zip
windows7-x64
9d889734783...48.exe
windows7-x64
daaa72f48b...2d.exe
windows7-x64
9ddbf1840bf...e2.exe
windows7-x64
10de882c049b..._3.dll
windows7-x64
3decrypt.exe
windows7-x64
3decrypted.ex_.exe
windows7-x64
6General
-
Target
Batch_6.zip
-
Size
8.6MB
-
Sample
241122-dwswastmds
-
MD5
efd2b474bb13fdb3b8a3159a64a22896
-
SHA1
48515da815cafb4d990efdd7b67baf86ac949813
-
SHA256
c41899315b2f3dad512ed1f58746e59fdb2f9717badcf7b2c861c1248d945991
-
SHA512
05195802d912ff48aac8035a8a061a3d8dc5b312ed936a147a742ad65ab75f982e3b443ebb001dd145086644006bfc361f83fb40799f60e51dd6eb053139f190
-
SSDEEP
196608:PYpWTGAAWAquK9u/2fpA4kuu0xCDCFvyRyi1GGywTpGRE:PYpWTGAAqub/2y4kudiCFviy88GGi
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
calc.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
chrst.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ci05l2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
com_loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
csrss.ex_.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
d.exe
Resource
win7-20240729-en
Behavioral task
behavioral19
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_TDS=4FA478A6.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_Dumped_TDS=4FB252FB.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_TDS=4FB30D08.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
d4439055d2d63e52ffc23c6d24d89194_86e510605f1ee068bdc1ae306312652a__1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
d54d2a216e637bcd36e5217cfba98896.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
d5f29750a8cb158d9b89a1e02e8addc5e410d1ddc48e660589144ade47f794c5.apk
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
d6c32b0146f219bdcb5cf524ea9e0047d9b9bd0fd7c395d5b11cbc4c3298824d.zip
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
d889734783273b7158deeae6cf804a6be99c3a5353d94225a4dbe92caf3a3d48.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
daaa72f48bea498c5ac7ce9bc315e585ff11dad04d1eeb0d1b0ce33a28bedf2d.exe
Resource
win7-20240729-en
Behavioral task
behavioral29
Sample
ddbf1840bf626da19d8f3467fe9e20e2.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
de882c049be133a950b6917562bb2313_583a76e23c1998307d702709dadbe103__3.dll
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
decrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
decrypted.ex_.exe
Resource
win7-20240903-en
Malware Config
Extracted
C:\Users\Admin\Music\!HELP_SOS.hta
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
D02D012970AA164CAD15C757D7E52994.exe
-
Size
214KB
-
MD5
d02d012970aa164cad15c757d7e52994
-
SHA1
25eef16797a7cf4168938f9d372332d65356b6f7
-
SHA256
eba685abd63d2c7378f788aa5ca8e4f95f4b82b51347cb8818090ef54e8f7d29
-
SHA512
640545996e924b5f759ba69f970686e67defc9142a195fb6774dd275e22961fd9b21328b119d42b4032f1cf4eb6363ccce64bf6f423d2bf3ddc1d8d5b1f524ee
-
SSDEEP
3072:BM+lmsolAIrRuw+mqv9j1MWLQ6xZ4qM+lmsolAIrRuw+mqv9j1MWLQlL:6+lDAArx2+lDAAmL
Score1/10 -
-
-
Target
DBm0yQwt.exe.ViR.exe
-
Size
216KB
-
MD5
3cb2c3ce48ac870ab0be9afb7233295f
-
SHA1
b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
-
SHA256
ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
-
SHA512
e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900
-
SSDEEP
3072:UPPdPl/PuW/Yqoeog665R6OKEjzG6hgckhmnl/5aUWTo+Kuv+nAo:UHTnVHv82ZJFgJ+/Hxn
-
Contacts a large (7699) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
-
-
Target
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.exe
-
Size
1.5MB
-
MD5
4b4d8abbca536c987fca430af62c9bc8
-
SHA1
4055b08de4d70cd512e1f10d186d887a2c38c86e
-
SHA256
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52
-
SHA512
1feb88f28eeda10e670761cda1d61039fc51f76e38aaf731cf11d7f4621b5f45ac2816037fbaf5a40ad53f14e221f24dbefc34023329a6b753fb90c35a515736
-
SSDEEP
24576:C6+MSDnehBCO+whjuFtxY5CMbkQfLenj3eesz07m5zvRquduX85ng7ScD:C6PQe3X+C6Mb1Den5i0MzvRgX85g7ScD
Score3/10 -
-
-
Target
calc.exe
-
Size
161KB
-
MD5
df543c8c85a47c41886f644f4ecf66ff
-
SHA1
460154b09e361829c46efcbd64848bfd1db43f53
-
SHA256
ef00fed6e97e926bdb3b968030795ef5dd34e8e40dec2b7cf802de97feed6321
-
SHA512
2a43d36b8db163de66c48d3e1db318d4ffc4aa52f2bb5e3b5074cd597cedd18be5f01b07d1afe7cb53af54c54d4e3e32e0bd0c27d2f8698459c1214b5ebfc17d
-
SSDEEP
3072:g4eqa10YgyW9nnrS8zut754EmUQqWKcm+cqAdZuRqoDb1Ndgjx9MApVfqF8CHJq:A5WFrbzSeE6qWK+yHuR/DfCt9vpAFrp
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
-
Size
112KB
-
MD5
c1fa82712918b9907168593ce4497295
-
SHA1
dbd20b8fb720fa9735c9b4edce20f819f26f3f15
-
SHA256
ffdc8e2813a270f45ebd2540e0b0d8730443b6ab444c2d8ac4d1b4dbbd1e7854
-
SHA512
3ddc30baca3c92566e68d2148912fdd72d470404793edd7448464ec9c5a092e336e0176ea4f55dedabc6f95bd7ad974507324177cb191d26a1f208dfb9b1db4c
-
SSDEEP
1536:mf/YvFSSZtDgN+DrDkDEFtCofF89lGL+v:Q/Yv0SZtDgN+Dr+EpfF89ll
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
-
Size
68KB
-
MD5
2fbed8e1453f1cf9c9ac43d642df00fc
-
SHA1
22aa6eeb79e95ff26f0775804152041aeb6df46b
-
SHA256
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2
-
SHA512
88043ca993f9fc81ae9a8da8579274796fde3f8bded78e11419fa06cf41466d671b0c50169645f19fa9e683c0b014d24366b31552f561267f03d0f2214578687
-
SSDEEP
1536:HFxpZTK0l7htEAoWt4EsLGtPx00oipJlzL6oMNbzKl+OJL8LeG:HjpZTKk1te/rLGtPC0NFLnY4R1G
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
-
Size
440KB
-
MD5
cd2d085998a289134ffaf27fbdcbc8cb
-
SHA1
e22678fe4bd0b209b14d5ed061ae61bb52e79df1
-
SHA256
0b12584302a5a72f467a08046814593ea505fa397785f1012ab973dd961a6c0e
-
SHA512
69c3ea1ff6c140ac4b21051bf0c0f3049750c31c0a1622ffa145daa1285b24678cd02d6bc89f85ecc5416b99ee99f42763a2d4e1d214c1d9d9e4acee834adc93
-
SSDEEP
6144:LDOrPcXOQeRKIawC7duJDaD0A9B5+9MRALsfwT4HZQO2f8etm:LqDQiF/Ad+9YzHZeZ
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
-
Size
53KB
-
MD5
16f3a592d1a19d9873134f8e9c6ebbcc
-
SHA1
4e1a7a09e393c0d387e4846b4a48bfe273effe43
-
SHA256
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36
-
SHA512
2b80c9ee5ba51132ab19059bef46d6db6228bea1d250905795f27ffabfffc20ad785aba42129a1d95b6432ea5a4cab226bf23cc7c2f658f7dc40770af93d492c
-
SSDEEP
768:uxX2MKhRw7+am7nx3h1OPG0H+l65Fuj0AjmWTbsbIK9QnjVPCxPao1X7tiJ+r/:uFKIqamtRMPJQoh2mqxTnjVPpJG
Score3/10 -
-
-
Target
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
-
Size
501KB
-
MD5
8cef8cf2a22f58a16b12b5b0b05552ba
-
SHA1
cf7382c25a8bf0d904d51063ceb29fb70f630bc9
-
SHA256
c95fde4a188dbc361f9eff80e9ba9d082ef40f7a16809b5ef4886903f8fc8698
-
SHA512
86031b49267669987ee4cbe0e267d953c17032428c4ccaac318c3737c2b9a4c0203fa162f8c83a7f1616b73450118e6e5c0a474008130e1681443b3a51171591
-
SSDEEP
12288:clxTE2jm56ven1viU+NoAHKor2Bzqbb+0eT9aEZuo:cE2qvGHKorIaK0eMjo
Score6/10-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
cgi19-alptsevs-h555.exe_.exe
-
Size
569KB
-
MD5
e9b9c39dd91c7fac1ee0b92e018a21bd
-
SHA1
1ddcf37b32f90f864b51adba3f4bd3a0f5ea935f
-
SHA256
388cc8da15d0fbee9bb9fb87715c8f2967b1584a12e30b4ea1ebbc27ff3b557b
-
SHA512
dee5a5da3fe70e5d15f48ba9e8d9204a2de641b91e22a8e3ddb7dfaa1aafd6d943bb21188985bb8d40836fc6e24ee2df9a9d988f5ea8048d30517cd6bf7e3add
-
SSDEEP
12288:j3nZMhJ+ubNmz0C4nkspjhPMy7NxkIXGUikyjk0y0xjYfYK4zjibVWidV3BtGN:j3nZqfbkz94h9P1+sbi3j2Bwjifv3BAN
Score7/10-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
-
-
Target
chrst.exe
-
Size
130KB
-
MD5
c657daf595b5d535ccc757ad837eebe8
-
SHA1
894e953e86e54a830a14fac94e57569d184a9c09
-
SHA256
a02565ec78fa1221433e720bd57b044938345b8c65a73143bd9ff73529767526
-
SHA512
21a26bc146dd2a915c17b268b13edc565e9a582d11c1714d89741f4156a880dfe35415d4920a6326d164519f4b28b6371ef9c7bfdb5e19080448bd77b4a20a4b
-
SSDEEP
3072:YpcslRnXfFdRIVLdkVz1ZIGWSt8t81U3Uxi1mVB9kx:4XfNSLdkryGd
Score3/10 -
-
-
Target
ci05l2a.exe
-
Size
179KB
-
MD5
27b4d4c481f97f0a90c420fb106be2a1
-
SHA1
35c8fd7176b2f50caf6af597b07d18074a6c8619
-
SHA256
94bf77695e893c6c9cd0b69e1081eb00a617ec384c980c127681d010f8aceb71
-
SHA512
8e6d23ec233308c32dfe4373900132b021856082584c94ddc01c31b74c859cdf73cb3b2816fd51a693848b35d248bcdc76212a3b323ccc045dcfc8df59bb31c5
-
SSDEEP
3072:Kz23EV9nbulU4sYjoEgwNLu4T4gG1ZJC8VMKsMJ9Bi1YrJ+YPkiKL/vZ6d:o3aJoEgiLuEEJjMaNI1iI6d
Score1/10 -
-
-
Target
cl.exe
-
Size
236KB
-
MD5
748ec019c171f22b8384195742967c51
-
SHA1
e3fefcbd3c432ac85d046a7ab27d2b0114ae658a
-
SHA256
b082e82311a6e8416b1823122959ea368316a936aa6ca667c032d300f76effaf
-
SHA512
a2bbef3dacdac5d5cf65f71f97c663b8731e2f2dbd9d923076e3551b68fce33157b961bd4709bfd6ccb1c5c807c453a8bae209538093dfe4c0662fb7e074ddc3
-
SSDEEP
6144:6741oQa1cxp/UWD9xgYxY68hX7Ph0ht7LRhU/a:v1uOp8J2Y68hLPhZ
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
clean.exe
-
Size
114KB
-
MD5
d15cfcd6caabb1cd1ebdc352a6ebb39e
-
SHA1
e60f23f716f37a7c91ae459fba65e41b4a60f752
-
SHA256
c926450324f23575ff6e980b70688caa56f584a84f2b447aea78183828099e50
-
SHA512
c5e3989e8157520036db2937c68bbb603ad58d16217fabbcb4860a7193d43e27d99062f4edcfcf3ab158ed7f0122df8665dd39aa1de53e81b2399aea6de7db57
-
SSDEEP
768:W+ry2sgHBHn+Kcv+aEtm0aOL9/rxM/UUk9B:I7gpiyri/UUYB
Score3/10 -
-
-
Target
coinvault.exe
-
Size
544KB
-
MD5
b3a7fc445abfba3429094542049063c2
-
SHA1
451d2a60192d5a49c13dd4aed19c15448358969d
-
SHA256
2a5333438bed6532770f7d34b72439006625a9b38fd91f7659e390530cda18fd
-
SHA512
711d5a9a0fe539dc9e12092d360b008cc469cd387606e5a76c703e98b7e71863256cea4dbabf41b69b5d6bf0a7cebc01f2acd445c8d0e3a841f8dc46bc532908
-
SSDEEP
12288:xtMW53Bkb5nG7KC/MIkf74f6Z0PvB5V/EXF:xtJ53m5G7fP+Mi
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application
-
-
-
Target
com_loader.exe
-
Size
64KB
-
MD5
7bb58c27b807d0de43de40178ca30154
-
SHA1
d3a69a5aa1f49a55eaed6de0686b45dede103b31
-
SHA256
eb72bef17b4f62a3cef6e36385cbdd65cf916f36b28d86b37b2990e2fc9e5330
-
SHA512
538527ca1c5037f4325ceca26b66ee0ef2d293eb29566b6bffa521593fa52e13450a01ba194ca5f574b2fa2d3335f3ab14ce759bf2d3421f746ffee5617a9d32
-
SSDEEP
768:TDYGaFFIR9v3PHchAps29+PP+ZkY1DjSzT2MxeRzL3MJV:HdJIAps29uujJjSH25
Score3/10 -
-
-
Target
csrss.ex_.exe
-
Size
892KB
-
MD5
d1217c81cca33f5fcc4bed6cd948a36b
-
SHA1
b1a299b2e29141618fd8ee1eba33f46dcbaa3f0a
-
SHA256
d460e5870a252c2827b88fdfc651a033a5d5875770f21a23b476a36e56ad5a8e
-
SHA512
bd63a2a187e5fba3691933b3eef02e86a09efd07d18c68dc1e372f9f848655ef4fffd930c5df6cc1f1ec10f66d424595c22866b74aa4d3688998c6c7013b897b
-
SSDEEP
24576:zdRpOBhPImfR23aAHRdY2Eq2htqgQdsmGDs2SZ:5R0BtoqAHnvEvhcVGDs
Score6/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
d.exe
-
Size
130KB
-
MD5
1e592556901445106d9b1e779bbe062d
-
SHA1
6999e59bd935faf42a977b25a078ce8adfe08dd2
-
SHA256
c2f7af050697d7b0140f4ee1ce6c87225e958e6ff4f18867afd842aecbfe87ad
-
SHA512
d6f24ac2034a1d876e910b15c97a324468ab2ca70799fd9fc72ade39daac76d4853ca8d1acba89d48525ce2ec5a7d018a9bf3383c6836633b81c32ef8ae331e2
-
SSDEEP
3072:CfAHvg0rsef7WSkYvnW4iq9jAfDkt31bkaQaY76E:KWr97WSBW4iq9jArk31Wf76E
Score3/10 -
-
-
Target
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_Dumped_TDS=4F9911B3.exe
-
Size
116KB
-
MD5
5a580ab3f5b3806da853459e9ef7b368
-
SHA1
df93c0f0dd694ab49646b539418b67d83eafccb5
-
SHA256
5f60eed8e27867c843387fe7fece3af688586a40c8d3dd2c27647b23cc200fdc
-
SHA512
91ecd8f00f4cd6c7d199eb365cb7cfa414bcab41b144fe7a5f43529e560201a81284cdb3a3d18d252e2eb4429a67f2db5718eacc8bf1eeb072958c0a4be20a3b
-
SSDEEP
1536:tf/YvFSSZtDgN+DrDkDEFtCwbfF89lGL+vpCYC:Z/Yv0SZtDgN+Dr+ErbfF89llpTC
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_TDS=4FA478A6.exe
-
Size
68KB
-
MD5
c4c129fa72b3c0a6364635e33ee3d9b7
-
SHA1
50f622bc092397885d032a26e872c6983c89a4b1
-
SHA256
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523
-
SHA512
5c17a3c8c3344254858d1401c0309af8ebb23e51717542493b2bf87184e30a914aab6c057a24882a2f376449d36da72c7b6542af475dbb4698c65ea739b41917
-
SSDEEP
768:cYC0MRRsJMuQrfJ6J7IIxDcSr1wif7SvK73qUzBA/mbLWpXcjMqJ8ocoNV3T9:cYLMRGMulJxf7EKbqaAqWp0MqJD3T9
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_Dumped_TDS=4FB252FB.exe
-
Size
53KB
-
MD5
16f3a592d1a19d9873134f8e9c6ebbcc
-
SHA1
4e1a7a09e393c0d387e4846b4a48bfe273effe43
-
SHA256
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36
-
SHA512
2b80c9ee5ba51132ab19059bef46d6db6228bea1d250905795f27ffabfffc20ad785aba42129a1d95b6432ea5a4cab226bf23cc7c2f658f7dc40770af93d492c
-
SSDEEP
768:uxX2MKhRw7+am7nx3h1OPG0H+l65Fuj0AjmWTbsbIK9QnjVPCxPao1X7tiJ+r/:uFKIqamtRMPJQoh2mqxTnjVPpJG
Score3/10 -
-
-
Target
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_TDS=4FB30D08.exe
-
Size
56KB
-
MD5
327cea8d93ff1094fe1ba9008e8c5657
-
SHA1
97574533c1260e6e3bd3008359e38055aba0d203
-
SHA256
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4
-
SHA512
7904652fa2c81296be80efec5617dd86059a940ef0ee10c45a9673d6d85cf845afaa188385d4dd7643ff37ad61a25c33c14486448c5eb51b55d9ba59158c6357
-
SSDEEP
768:mbLjRB9o7troDVMOXsgRha8ZwByuiiCKR0YFeIupRXnzUpiPqDOyktPxEY:k/L9stroDzRhD6yuDR0lIupRnXTboY
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
d4439055d2d63e52ffc23c6d24d89194_86e510605f1ee068bdc1ae306312652a__1.dll
-
Size
160KB
-
MD5
d4439055d2d63e52ffc23c6d24d89194
-
SHA1
92a35105a3cf19a183ef9ca9e66cb9063fffecf1
-
SHA256
1036c84a003378907560356642bb065caef961f9dbc5c3b2a4954d5cbe7100df
-
SHA512
f9d77411522444d7924baf6c0933cb3f4ae856c4e5b73990e81b6e2e4e372b309aececc585df3b3306db037612b1fb09516adc0403c28306f37cf3bb2b9f9499
-
SSDEEP
3072:OcT8OeFXkldH+kqGq+WZO1Vdeuo5punOreYt2HxOMrR7:/T1Cklt+kqGq+WI1VdeaEefUM
Score3/10 -
-
-
Target
d54d2a216e637bcd36e5217cfba98896.exe
-
Size
285KB
-
MD5
d54d2a216e637bcd36e5217cfba98896
-
SHA1
41e846d00379083a988db6028890233b4d74e8f4
-
SHA256
d620778dbbcf11e3a293aeaaebac7b6a9a02e7d8790ca5ffa59bda1e9b9632f4
-
SHA512
b92fdfd0ec1cbbfc4145465b88efe75223fb4df2df1d77122527175d211db0d572449726dd9ea8579f7cb4c5dc9df467f5980cb7344b7e931e85a34207f500b3
-
SSDEEP
6144:XZABbWqsE/Ao+mv8Qv0LVmwq4FU0fNoy6x2UjYe0yIJA94agq/L9j:pANwRo+mv8QD4+0V16x2Y0yIu4agq/Lt
Score7/10-
Drops startup file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
d5f29750a8cb158d9b89a1e02e8addc5e410d1ddc48e660589144ade47f794c5.exe
-
Size
1.7MB
-
MD5
187f7d5ae06b386581f5f177340ca2b7
-
SHA1
0f25cefa85a0822a08ad23caca24a622fbf4aef0
-
SHA256
d5f29750a8cb158d9b89a1e02e8addc5e410d1ddc48e660589144ade47f794c5
-
SHA512
682d127bf1ffc42cc475f119a010eeb12460ca2e9a8fbc8a0207e3ee8912ed0c8a0fcea374c83e91f494cba2bc378173f1833b3b4f5913b622279da2c0f62248
-
SSDEEP
49152:BATnMeAX+Iexb7peltHmeOCbJOIOUCZKw:BeMtU7pMHVZJOzTB
Score3/10 -
-
-
Target
d6c32b0146f219bdcb5cf524ea9e0047d9b9bd0fd7c395d5b11cbc4c3298824d.exe
-
Size
284KB
-
MD5
3751a4a1f68718405518d107a8bcc563
-
SHA1
c58fe7477c0a639e64bcf1a49df79dee58961a34
-
SHA256
d6c32b0146f219bdcb5cf524ea9e0047d9b9bd0fd7c395d5b11cbc4c3298824d
-
SHA512
8fa33e5682069baf48c0e85375a4151356e5917d63fbe62642c1dc9f33ce77881a359c2300e2d221bce297fbe7349a66b55cc47ff8502125b2a44c23d59e8dfd
-
SSDEEP
6144:ZcQu7L20QOPNMNYKEdf7Q0chT7WbK1xb5a:S20Q1YKMfE06ja
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
d889734783273b7158deeae6cf804a6be99c3a5353d94225a4dbe92caf3a3d48.exe
-
Size
419KB
-
MD5
71375aa4ad00f0fb209c8f22e0090715
-
SHA1
d7b0255d7d98c33a30fe71543ec98d802c2a2dd7
-
SHA256
d889734783273b7158deeae6cf804a6be99c3a5353d94225a4dbe92caf3a3d48
-
SHA512
82281ebc86c9cb70f56bf1f6da625397e8d74f504c38f893a82b780b690796b0c107ba15854b0650d71546a45e98cb9b1b85ff50ec8e34dd0d1658babb310c1e
-
SSDEEP
6144:hUACNIqeT/ibcxeejQB/VlTpMf5wh4rNJPAyPmzwl+jJJxV0N9XN/:h/CyToGgjEwh+DPAKBgCNhN/
Score1/10 -
-
-
Target
daaa72f48bea498c5ac7ce9bc315e585ff11dad04d1eeb0d1b0ce33a28bedf2d.exe
-
Size
823KB
-
MD5
82cdd59192afa50e4dbe1b16d6254ad7
-
SHA1
7392f0d93fd8e604431adedf00b237ebbf6a3881
-
SHA256
daaa72f48bea498c5ac7ce9bc315e585ff11dad04d1eeb0d1b0ce33a28bedf2d
-
SHA512
a5e2e99b3725c4e860caee27ed2a2dcb35a3f3fe3abc06b9412b209e950cd518049e53831ec3c9adf74b0d4815e271dbf0832db70f9a9435ff7a6ad61121cb2a
-
SSDEEP
6144:PrjxuKuDjTlGWu5kOqaJ049Od6bKaZ3GS4Ur3jC/ZdXtrOsEJDQqEGQLzXQ4T:ZyDjxGWerJ0eWQ443u/tabE
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
ddbf1840bf626da19d8f3467fe9e20e2.exe
-
Size
173KB
-
MD5
ddbf1840bf626da19d8f3467fe9e20e2
-
SHA1
e56e267b688418c372ce088d09c027338bcede3e
-
SHA256
85113774d887cf194b7bfbcc8b44f0904a49a19b9c4cf304d11a4b73944996a7
-
SHA512
5fa35c8e132ae631a280e5ab3a3fae79e6bd5327e969f52ebd5cd57acd244b72860221c70099f7f824dcb5c63d287f1fac1e31525c090bf10bcc3bb26b5d50a2
-
SSDEEP
3072:MtmG0J6qaFw9mIxlCxkwCQ5fdWw8DKCegdMf0x+bwAv7M87T0M5g9S3Y:Smd0qqaAxlN8D9egmFbwAV7T0Mo
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
-
-
Target
de882c049be133a950b6917562bb2313_583a76e23c1998307d702709dadbe103__3.dll
-
Size
659KB
-
MD5
de882c049be133a950b6917562bb2313
-
SHA1
93e9e42eba18e83811b4e9858be5cd09b9c50e5d
-
SHA256
e53610a977b65c01b275e37aefad7884368dfe00b50750e35b6c8c87556a2c06
-
SHA512
a5915f0247627f3556acea9743d2bfa7f9b4c6d047f4fa754684bd973f8926fdd50d52572d8c24cf33bc771870b84950c27ee0ba9dc9eec2f2738f4f3374e271
-
SSDEEP
12288:amxpNJkdqblBAEBJ05jP5Fspq7EuVvCxcgOmKVEPILAJtARBvq8IqpwNBcLRm8QL:zxrJkdqblBAEBQP5qQbVvCNOmKVE5/A8
Score3/10 -
-
-
Target
decrypt.exe
-
Size
75KB
-
MD5
cde1a96c7d1fc4fd04d4f076b936e9a0
-
SHA1
76cab15be34a942de6f878ec11ce5100f10e6855
-
SHA256
491333504219247276258b0691a79e4ccfbc4162999f9f372512c337418e757e
-
SHA512
782d4e602422a67539116d57e82a2362540aa52f28e1e2ce5ab238b3733b60926d9e540888bee9b558c76f7f53b9ba6f98d0dd6d7c5c8dc47354fe07a17da615
-
SSDEEP
1536:v5gwm1brk4bXgdDMyR6u7YHwpv7EBFG36CBIvRo28aPduysjCPaAmy:nww9Mg7YHGvKG36
Score3/10 -
-
-
Target
decrypted.ex_.exe
-
Size
507KB
-
MD5
b374304c7603f7ea36112909fb3b8991
-
SHA1
222e85c995558ab0bd14e4a840a3788fe63d380f
-
SHA256
ea407f99a8e150b84bbfb47f1c22e2ef804333fbe4315ada0aab919ae2d2ec7e
-
SHA512
42ab474f6bc309bf3d2c2fb636804c293f3fc384304d7dfbdfd4e388cba6dbac0934295030e09c6656b69b1c8a9aac3c3d70e7c2e2c2cdc9eb2c0bfc0ede2700
-
SSDEEP
12288:njQfF4Ibclmp6S44rgpEEt5p69QFCkohJW:nsuRlmpl440ttGi8hE
Score6/10-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1