General
-
Target
13016683622.zip
-
Size
166KB
-
Sample
231122-nq735scf9v
-
MD5
8d581a0bd912781fd1eae7599bd650ee
-
SHA1
dfde53870711b6a0a18fb5f36884021fc5a01504
-
SHA256
71e1557e73378a93c8dcbed553ad80b1d58a353a18df8ecce2ba2c2d96fa33a7
-
SHA512
0d525e52c0714e08de94eb5a2b3617e63c7be790888c9ad4d37e8e8fe6d8a396bc18e9b741b0ed8024cded5cab709ec0bb53f05f39b761e6e35566c4dad70686
-
SSDEEP
3072:jgN0V436XPQsuXJwqYT+b9dLjtuvgd0g9sgdpSVFi4IW9OZ/uVU:jgKWK/IJwq88zZdPMFQjZ9
Static task
static1
Behavioral task
behavioral1
Sample
518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\users\public\desktop\info.hta
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
Targets
-
-
Target
518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c
-
Size
281KB
-
MD5
2809e15a3a54484e042fe65fffd17409
-
SHA1
4a8f0331abaf8f629b3c8220f0d55339cfa30223
-
SHA256
518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c
-
SHA512
698e16fd67861377e2ccaace4d0e1a619a8b7c68e8aefc4090e9d1cbbcdfb8d8aede76f9e63f81479f5a035e8008699a4d7175da6248e6e49eb7c81b3dba30c3
-
SSDEEP
3072:D5IwIMZKkczttW5ivhjqKO1I9Goh6F4mAqeormMkpCWlunhNGA5yjszVIEe9:NIMsztZZ+KQqGo5QfmLpCoun6W
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (310) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (458) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1