General
-
Target
96C63C3C423E4B1117E0C82E5796DCD5F1C0D683.7z
-
Size
2.5MB
-
Sample
231117-kpfeysgd97
-
MD5
e4df1ac6eda1916ed36236d4cf51e880
-
SHA1
e17414118419f507dac84b673fb0992f2f704edd
-
SHA256
aadf321b2c07b98319937844793afa4d1b5f3501919305ef684911cf131286d5
-
SHA512
e07e601645ab11612fa726683e8daab707dfdb2b035814930c1a3671928ddb98ab943460ce390893c98da40eaf316fd8ab8885ae53e1a17b7cf48794185f1dd5
-
SSDEEP
49152:ezRVmRWV7q1PsXrKqt4DBHK0fZBjGxiVusAp5H1XaOnOq1GPi:AqRWVgsbKqto7xBjGxiVJE1POq1G6
Static task
static1
Behavioral task
behavioral1
Sample
96C63C3C423E4B1117E0C82E5796DCD5F1C0D683.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
96C63C3C423E4B1117E0C82E5796DCD5F1C0D683.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\IMPORTANT_NOTICE.txt
Targets
-
-
Target
96C63C3C423E4B1117E0C82E5796DCD5F1C0D683.exe
-
Size
2.5MB
-
MD5
b4448ceddd85ec0f061f53ab1a977b5e
-
SHA1
96c63c3c423e4b1117e0c82e5796dcd5f1c0d683
-
SHA256
d7c50dce5f77ae0f144843e8eaf3e29034e14f6ac9293f0dbdf59fd2fc257452
-
SHA512
29f1c8f4d1e551e31d453c455bddb1e9fe8d74bca35338757ab9d3b31110c460b69ed06d5b452376b57afa4a82f5d4b2cdab7dfa8e636cb800d0a3fcded4b1f3
-
SSDEEP
49152:QgwR+ifu1DBgutBPN2q1dNnzbpz7Mwulf+qV8L77hpe3D04dtaa7P:QgwR+vguPP/7NzRMwulF8L/hpe3YI
Score10/10-
Detects Mimic ransomware
-
Modifies security service
-
Modifies boot configuration data using bcdedit
-
Renames multiple (3697) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (5789) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
7