General

  • Target

    torbrowser-install-win64-11.5.8_en-US.exe

  • Size

    271.0MB

  • Sample

    221126-s6lbjahe9x

  • MD5

    c9bdfd2d99730f4969b16daa7b55f09c

  • SHA1

    d7a3f9e0df14aa53336271f6a80a6a968f52305e

  • SHA256

    16f47df2e331c8f70920ffc50ed2c14a53b4079cb989028b0900ce7ef18bd623

  • SHA512

    9fcf9d5de9ce7d2e054a122c5790713e106dadf58eaa6bfe6049a25adae9966c0efde9ba1db3a61b312e000e1bb2acaaeca4f07266b921c148a2e8cf91c1ed12

  • SSDEEP

    196608:ziJQ0v+cIuxunU9+MJQBGqVUE8Fx0hw35EyN3PN8Cg7Hr0EE2xsJ12QX6Y:ZolunU9XJQBqEwd35Eg3PNgHjEsq

Malware Config

Targets

    • Target

      torbrowser-install-win64-11.5.8_en-US.exe

    • Size

      271.0MB

    • MD5

      c9bdfd2d99730f4969b16daa7b55f09c

    • SHA1

      d7a3f9e0df14aa53336271f6a80a6a968f52305e

    • SHA256

      16f47df2e331c8f70920ffc50ed2c14a53b4079cb989028b0900ce7ef18bd623

    • SHA512

      9fcf9d5de9ce7d2e054a122c5790713e106dadf58eaa6bfe6049a25adae9966c0efde9ba1db3a61b312e000e1bb2acaaeca4f07266b921c148a2e8cf91c1ed12

    • SSDEEP

      196608:ziJQ0v+cIuxunU9+MJQBGqVUE8Fx0hw35EyN3PN8Cg7Hr0EE2xsJ12QX6Y:ZolunU9XJQBqEwd35Eg3PNgHjEsq

    • Modifies Windows Defender notification settings

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Windows security bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables use of System Restore points

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

3
T1089

Bypass User Account Control

1
T1088

File Deletion

2
T1107

Hidden Files and Directories

2
T1158

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

3
T1490

Tasks