General
-
Target
1.7z
-
Size
2.0MB
-
Sample
231112-qvdffagh84
-
MD5
197d90305f284ea18cc351d4db78b9a3
-
SHA1
e2ebafdf00812a4dae2fa5ecb5fc2c012f949fc5
-
SHA256
b88691f30a8387bcad3d54d8872558254fe781f173d22e16c3e45b6651153062
-
SHA512
21a5dba7197baa8f376205be2683adb74918371ccce91a68fdce4b43e35cccd6e0a034e6343236c9a3a73a5856613633cd0c0dad8390c832b73a325ddb025755
-
SSDEEP
49152:mNawccb1XoOMpHIoClrQt0oZAVI16tkGX1Iz:mQGFRCHIJlrQt0oZnQtkGX1G
Static task
static1
Behavioral task
behavioral1
Sample
pa4yg3aq2.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
pa4yg3aq2.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Instruction.txt
Targets
-
-
Target
pa4yg3aq2.exe
-
Size
2.0MB
-
MD5
e5e0fa7832b6630d54f99da00087ffca
-
SHA1
8300201409248528bcc9ec16d54296658fc77a74
-
SHA256
bfa636627ea8a5fc3053875e45eee1c0ae08d442c71ccfb9b672457229895548
-
SHA512
c6c2532e22ae3a180b29b9d4be63fed41116080d5e135c41c87bf59ef7dddbc8b5e22f2aa098e2b3a1f6ae296aab4172d924c36908dff4c4ad412e201692850f
-
SSDEEP
49152:wgwRFifu1DBgutBPNzbLZFFpimjrkrFmaCntQxi7AJVqDsHpm:wgwRFvguPPpbdYsgF1wtQ87ADosg
Score10/10-
Detects Mimic ransomware
-
Modifies boot configuration data using bcdedit
-
Renames multiple (200) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (240) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
5