Overview
overview
10Static
static
3Fattura 00...df.exe
windows7-x64
10Fattura 00...df.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Nwiz.dll
windows7-x64
3Nwiz.dll
windows10-2004-x64
3General
-
Target
bcd9fa9f553a16595cdc8138cbc57a05_JaffaCakes118
-
Size
781KB
-
Sample
241203-ly1ypazpdw
-
MD5
bcd9fa9f553a16595cdc8138cbc57a05
-
SHA1
f1dbc1e41e2b1a587785473fbee8b44c44b9dc14
-
SHA256
bd73f27673d98e8d9fb20bec3ef0dd4456e33eefead3839a68c2228a5c1686ab
-
SHA512
723a53a0af7ec185d1dd2fe3369fc83584eb22e600b3b8196e15bd5991f09813c75dc0854b0af3c9c34fc8ca303d5df56f7047fbc50b646064671aa5c70e1d4b
-
SSDEEP
24576:XMGnp32Wyylm04ohyFufJ8V8FISkWduPuKIHTrwcm/DX6QC:XZZyAmqcFuxeI7+h9B/DK
Static task
static1
Behavioral task
behavioral1
Sample
Fattura 00384788-00849838.pdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Fattura 00384788-00849838.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Nwiz.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Nwiz.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Fattura 00384788-00849838.pdf.exe
-
Size
884KB
-
MD5
23c1fa39c8cb4a46d54b2c9ea9df952d
-
SHA1
815dfd495271d7792e5d0dbb3e78a14bf4a8fd90
-
SHA256
97be6754d010714743932afa3f4ea308e2f0b19212e8b8b150af7cdd3383f44b
-
SHA512
78106662327d856f05bc98bc700ab0f5d719fd2365c46db26400ad140b96004a86acd9831cba3799de4eeffa959c82c5ee557c1a1db266f79c49aa4b910e5d60
-
SSDEEP
24576:dRHuj2I8hyf+fJGV8HiukodYP+gIHB7wcmZtpU:2jL8cf+xIsDWlVBZt6
-
Ctblocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
eee2912bd1ee421cf1f1dfb1cc327d97
-
SHA1
c5d3741ddb195718c9b17923eb6abfb7a732bdc1
-
SHA256
e560384c5298ee2123e8340e716b2c4680f51b4d0347995ba3290dbd1130c6c0
-
SHA512
1808a068386c790d8ad5096d9fededcfa6e5688e3a68f2499418456c9cafd7b837c811298e6570212155b4a3d6038c1749cfcd9d1b86f090f66d1a5301adecb2
-
SSDEEP
192:qcOqh13v5z+dHeMR2QwHu5S9i/yULWWBZYJCSJyejPK72dwF7dBKEw:qcD13v5SdHeMRRKkwsejP+BV
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
883eff06ac96966270731e4e22817e11
-
SHA1
523c87c98236cbc04430e87ec19b977595092ac8
-
SHA256
44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
-
SHA512
60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
SSDEEP
96:UPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+l:UPtkuWJX7zB3kGwfy0nyUVsxCjOMb1u
Score3/10 -
-
-
Target
Nwiz.dll
-
Size
54KB
-
MD5
af5cfacd0e4f50aea5e1353131d31ee1
-
SHA1
2c25083e39c4604bcde7ebc1ea966d45646eead8
-
SHA256
60737caef33db58b24924eecaeb13e9d6c6cbc27408fd2c59cda67d326b1495e
-
SHA512
5c58ecb55ca6a82bfe6d5647058b4d2e852010029d4a356d7cbd4a4e7fa3f31ca3fb88a8e81c9566e9d9736e104e8d8375053ff89d90802cc145e27349155db9
-
SSDEEP
1536:99Yy15JFAVwHDDUpGPxXrE0aoG8GrjkRXaFyu:7Y8tDUpGsjkRXaFyu
Score3/10 -