General
-
Target
16090949233.zip
-
Size
40KB
-
Sample
240321-l51lhaae9z
-
MD5
2b295df5f1df15e6186acabd1db439e5
-
SHA1
bbba1947ab7fec68a46944d2873b221760546d10
-
SHA256
6f07f884dc68b581dcb0762d0cf19f3c4caed5cc38075a808b5b307b27d76f2c
-
SHA512
52f637ff5743a2e85f8fcf3cba0a11ad6c1e0b0611ac7497682100c832ae3b519ec50258ab846e5ca433ed54d9fb1365fd1624ea9fef0db2837c3fa040330227
-
SSDEEP
768:uUqchmIyc6tBmHb2Zq85GmB1xma22qMkS1rSeniP8yGGI4PBt/Dl45mFu:uqaJtBmHSRiasISen2GGIUBt/Asu
Static task
static1
Behavioral task
behavioral1
Sample
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6
-
Size
56KB
-
MD5
62885d0f106569fac3985f72f0ca10cb
-
SHA1
cb37b10b209ab38477d2e17f21cae12a1cb2adf0
-
SHA256
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6
-
SHA512
1fdd982323e314b97dc4b6878f92e965aeefee9f89203c4ca944e8e540d5a990dcb5cbfb5455794e1ef3ad3e7d990e20b12af70f3310b1ff92c8402c43275c2a
-
SSDEEP
1536:sNeRBl5PT/rx1mzwRMSTdLpJNr+eiukbsSw:sQRrmzwR5JViums
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (313) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
2