General

  • Target

    r.exe

  • Size

    7.8MB

  • Sample

    210210-q7b2t86r5x

  • MD5

    939ba0623704350ce7c139aabee00df5

  • SHA1

    4407dc92a0dbc8ef99035dc682a8752f793bf55b

  • SHA256

    2db7866798f1d612aab8fdccc3420096ab11f208a37bdaf3f8d49480da4c06a6

  • SHA512

    76c826928eaef2a80e804ee1fb7f4a2c3d6b6370eade5c2f82671611e3253b30596655b332d19f21af714adc8015db31c3fa5dd1aa76a81b7d7840d99dc16dd1

Malware Config

Targets

    • Target

      r.exe

    • Size

      7.8MB

    • MD5

      939ba0623704350ce7c139aabee00df5

    • SHA1

      4407dc92a0dbc8ef99035dc682a8752f793bf55b

    • SHA256

      2db7866798f1d612aab8fdccc3420096ab11f208a37bdaf3f8d49480da4c06a6

    • SHA512

      76c826928eaef2a80e804ee1fb7f4a2c3d6b6370eade5c2f82671611e3253b30596655b332d19f21af714adc8015db31c3fa5dd1aa76a81b7d7840d99dc16dd1

    • Registers COM server for autorun

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks