General

  • Target

    HEUR-Trojan.MSIL.Diztakun.gen-d688e2ed2869999cd931f22fedd68a87a1107560c06a0b4ca9dc4d0718ad946b.exe

  • Size

    24KB

  • Sample

    220925-vdzdssfdg6

  • MD5

    f2dcce3320e6ecdb91405084fe3dcaaf

  • SHA1

    9e6d874ce82756943bb239787bf77bae99e43ae0

  • SHA256

    d688e2ed2869999cd931f22fedd68a87a1107560c06a0b4ca9dc4d0718ad946b

  • SHA512

    0d702ec1d467cf80ad1fb146b190ba689ed451cf30dcfc675fe45d295f7fe7d88f5e8f1c3c9a44a8e0931f58473e68959842834e2a8869939f7d4eedf6abd62c

  • SSDEEP

    384:OhhphPGDRMLGDRmosJA/CdAGCik5U6+T6CgOLs8yKPlEt85uvupX8ffHq6kYcKV1:ChphPGDyLGDRmoMdl/rat+t/PYcKV1

Malware Config

Targets

    • Target

      HEUR-Trojan.MSIL.Diztakun.gen-d688e2ed2869999cd931f22fedd68a87a1107560c06a0b4ca9dc4d0718ad946b.exe

    • Size

      24KB

    • MD5

      f2dcce3320e6ecdb91405084fe3dcaaf

    • SHA1

      9e6d874ce82756943bb239787bf77bae99e43ae0

    • SHA256

      d688e2ed2869999cd931f22fedd68a87a1107560c06a0b4ca9dc4d0718ad946b

    • SHA512

      0d702ec1d467cf80ad1fb146b190ba689ed451cf30dcfc675fe45d295f7fe7d88f5e8f1c3c9a44a8e0931f58473e68959842834e2a8869939f7d4eedf6abd62c

    • SSDEEP

      384:OhhphPGDRMLGDRmosJA/CdAGCik5U6+T6CgOLs8yKPlEt85uvupX8ffHq6kYcKV1:ChphPGDyLGDRmoMdl/rat+t/PYcKV1

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks