General

  • Target

    d1d4e29f5fca0c97cd89a4b5134d298.msi

  • Size

    100KB

  • Sample

    220322-pf8glabdgp

  • MD5

    aebfb88d2333ee74373a4cf582682070

  • SHA1

    3d8b0dd99846144287aeeb025a5c9fc254f66fc0

  • SHA256

    d1d4e29f5fca0c97cd89a4b5134d298bf2829cea92e5d116084b83d980d2c6e0

  • SHA512

    9feb73d9c4902f03b94df49b3087418473dd0826480b5fde8ba3654dd8bf22bb372c8881e5254e5e8a0f6cf78bfb2d80c9060208c66478362bc6f75f12fca8cb

Malware Config

Targets

    • Target

      d1d4e29f5fca0c97cd89a4b5134d298.msi

    • Size

      100KB

    • MD5

      aebfb88d2333ee74373a4cf582682070

    • SHA1

      3d8b0dd99846144287aeeb025a5c9fc254f66fc0

    • SHA256

      d1d4e29f5fca0c97cd89a4b5134d298bf2829cea92e5d116084b83d980d2c6e0

    • SHA512

      9feb73d9c4902f03b94df49b3087418473dd0826480b5fde8ba3654dd8bf22bb372c8881e5254e5e8a0f6cf78bfb2d80c9060208c66478362bc6f75f12fca8cb

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Blocklisted process makes network request

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

2
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

4
T1107

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Impact

Inhibit System Recovery

5
T1490

Tasks