General
-
Target
9824d07cea51069c0042eff0e46d1ad2.bin
-
Size
284KB
-
Sample
230918-cnzhfaec2z
-
MD5
060b98b92140fdcd717c1fc421739772
-
SHA1
48310e80f82ec686207ff6eb84a2e586bb7cd54d
-
SHA256
fe025cd046edabab5a07d058bfcbb884c144511581d5206681064355fb2834bc
-
SHA512
5f6ec1e59ad8b98bb5ebb548e7d22db59d0a256c521eb8bd5ee58553510d28b1ef3e0abe1297129acf65ba5c45f397e140caacb1dae43610a13326cd0b6bf6ae
-
SSDEEP
6144:FUKe9SG2zYVb77tY5qsyZQ5BkATTLmXQux0pSYlfSSeAXdx:FUyG28b7JYEtYBLfLcZxKfkMx
Static task
static1
Behavioral task
behavioral1
Sample
d7cb8a2d60e1818d0638a4c38cd6fae475dc83ab7b2bde9827ecc4e4a7ce6ed7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d7cb8a2d60e1818d0638a4c38cd6fae475dc83ab7b2bde9827ecc4e4a7ce6ed7.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\Desktop\info.hta
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
d7cb8a2d60e1818d0638a4c38cd6fae475dc83ab7b2bde9827ecc4e4a7ce6ed7.exe
-
Size
312KB
-
MD5
9824d07cea51069c0042eff0e46d1ad2
-
SHA1
70ef130a8f88076dc671ab9873b2a3a3c45818fc
-
SHA256
d7cb8a2d60e1818d0638a4c38cd6fae475dc83ab7b2bde9827ecc4e4a7ce6ed7
-
SHA512
6d38269e1c93c7e8bd6668cd26947cb821043c9bcbcb19d586795e0fb3d52b8a492e3817eef912bae165973c001c205fd879bbca9810339e6b45bda1651e3bb9
-
SSDEEP
6144:XAo4v3KmeRDWs0cSsm42PWB1vEtf8h81dZgjvxbtIGnWSPgYYshfnmU3H1l5Fy4:XGimeAs0cuvuB14I9JWfWnNl
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (326) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (474) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1