General
-
Target
15997814924.zip
-
Size
40KB
-
Sample
240320-n8ymesgb69
-
MD5
9f1fd8b1cd5c725cd5fb1c1ab597e0de
-
SHA1
443ed4eb09905ca77fcf2583e104064d622f14b0
-
SHA256
52e7a6b14d93e80ae2921306e9adaf26bf2f623a8d6ec22ab1ffe808b7cca4b6
-
SHA512
9942f466baa06ed4dc0bb3a8f6de21055c9d129b686f5ec75f9dfe315aff423a12ca241fe114a2e307e285eae291d2bce24d6c9aa8d68678bd2b91a7bf4273aa
-
SSDEEP
768:MysXFfu2uIvvQO44iMGfy+wL1/RPIgEveP4ua4VpFnpo3:M7X82TIO44i1fy+u1Jg9ePZrFnpo3
Static task
static1
Behavioral task
behavioral1
Sample
acf2e97465dbecc6f361ee9b971a0747b1ce17aaee76d59bf4215114ee5778ff.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
acf2e97465dbecc6f361ee9b971a0747b1ce17aaee76d59bf4215114ee5778ff.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Public\Desktop\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
acf2e97465dbecc6f361ee9b971a0747b1ce17aaee76d59bf4215114ee5778ff
-
Size
56KB
-
MD5
f89ebf18eb7e3af3698680cd11070e31
-
SHA1
21f61da9b4b23ebb6073d95bfb7ea9cb597e34d6
-
SHA256
acf2e97465dbecc6f361ee9b971a0747b1ce17aaee76d59bf4215114ee5778ff
-
SHA512
67307c06474461abddc604dcd217a70f69f4ee73fe128acdbce249b4fe0cc423f42cb11c437419a98d7558cacde4a5495a081be7be018ed24a6bf90525dc8122
-
SSDEEP
1536:pNeRBl5PT/rx1mzwRMSTdLpJQr6TDx05uW7:pQRrmzwR5J86TFxW7
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (319) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
2