Resubmissions

06-02-2022 09:21

220206-lbgarshbe9 10

06-02-2022 09:18

220206-k9rcyshcfn 10

General

  • Target

    NoFile.exe

  • Size

    2.2MB

  • Sample

    220206-k9rcyshcfn

  • MD5

    7d1ed67b77f47ba8aadf9a3ac7d0c371

  • SHA1

    a598e6708c189caeef1fa76064feb4d0155abb3d

  • SHA256

    87300e6563c7ac9d8d758b219d135fb8b84a7788419a0ddd8c3470cc1e739eae

  • SHA512

    17e468ba87f06c599b40b2dc8256bacfcfeb53cde8ac48b77d61f2c5a074b9cbe19e27e71029c67960d18af886813fc2c1b2b5afd89ae25147b179c233f120f9

Malware Config

Targets

    • Target

      NoFile.exe

    • Size

      2.2MB

    • MD5

      7d1ed67b77f47ba8aadf9a3ac7d0c371

    • SHA1

      a598e6708c189caeef1fa76064feb4d0155abb3d

    • SHA256

      87300e6563c7ac9d8d758b219d135fb8b84a7788419a0ddd8c3470cc1e739eae

    • SHA512

      17e468ba87f06c599b40b2dc8256bacfcfeb53cde8ac48b77d61f2c5a074b9cbe19e27e71029c67960d18af886813fc2c1b2b5afd89ae25147b179c233f120f9

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

File Deletion

2
T1107

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Impact

Inhibit System Recovery

2
T1490

Tasks