General
-
Target
Nicht bestätigt 829106.crdownload
-
Size
1.8MB
-
Sample
240125-mjd12sdgh4
-
MD5
d156711735a2fb0992440a2cd0a19138
-
SHA1
c8c9645ae15012eb25e83841d87a3ac6c16344aa
-
SHA256
79468940d42d217a815eca555b9d2efe72b4f2a53e47d29076c3adde5eb9c5af
-
SHA512
4d10a6a0c77e9bb5feba5a110da54e21ec201cbed7002b9a58a61087b0986e960fa7ba233bc111151ce8c145d2851720678923ee6306b35c169a8dd4bacf273c
-
SSDEEP
49152:2NA8O1U5YwSTTEVOCT316+f0RbnRM13qE83q7rjjY/qg4wG:21dYNOOSE+f0RzRMdc3Afjtv
Behavioral task
behavioral1
Sample
Nicht bestätigt 829106.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Nicht bestätigt 829106.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
C:\PerfLogs\lockxx.recovery_data.hta
http-equiv="Content-Type"
Targets
-
-
Target
Nicht bestätigt 829106.crdownload
-
Size
1.8MB
-
MD5
d156711735a2fb0992440a2cd0a19138
-
SHA1
c8c9645ae15012eb25e83841d87a3ac6c16344aa
-
SHA256
79468940d42d217a815eca555b9d2efe72b4f2a53e47d29076c3adde5eb9c5af
-
SHA512
4d10a6a0c77e9bb5feba5a110da54e21ec201cbed7002b9a58a61087b0986e960fa7ba233bc111151ce8c145d2851720678923ee6306b35c169a8dd4bacf273c
-
SSDEEP
49152:2NA8O1U5YwSTTEVOCT316+f0RbnRM13qE83q7rjjY/qg4wG:21dYNOOSE+f0RzRMdc3Afjtv
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (207) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
-
-
Target
out.upx
-
Size
5.1MB
-
MD5
05e310b856fe180d3e4cf606c73d5212
-
SHA1
7214d001cbac4191446d68d045b3bdc0964a2cc8
-
SHA256
69a693a243b47e2e50d5c8173c72cf0cc219a109bfeba6683cf907ce527377ac
-
SHA512
b628833a55bc529d9e2687aa224890ab9a4b9592c32d30726af228cb98cd4d8b6cf3689191ef223b9617f34ae0614fe233b3afbd8c6e1afe9eb5c5297cea67a2
-
SSDEEP
49152:dnIfVc/Z+xgIVjX7li0UqQraCf+T7s4ID1z1mJ5E3gvtJu3DgO8uISgk+SIfDgp:W0+xgIbUlrruTIKfE3gP9c
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
5