General
-
Target
58dbb7652a479930a06e724f8aa1223d7f273b4e6ff92b356db75a8a7dfb9cf6
-
Size
55KB
-
Sample
240325-xqeahafh73
-
MD5
c86502089be5c247bfb90a788ee74fed
-
SHA1
ef313d00d8a2559f54a03cb25a08cbeddf56127d
-
SHA256
58dbb7652a479930a06e724f8aa1223d7f273b4e6ff92b356db75a8a7dfb9cf6
-
SHA512
693aec0b2779268bf12967506d7138377c70612445818c8ed988a9e0881a180b86189a5497a0a27daa1ea1ef5a910bd251068cda6615c124831992943891cc30
-
SSDEEP
768:HvrNNeRBl5JFTXqwXrkgrn/9/HiDKGwRj4RcTdyH4pYT3nPKVU1En4qTdwR8xfA+:ZNeRBl5PT/rx1mzwRMSTdLpJn4qF
Static task
static1
Behavioral task
behavioral1
Sample
58dbb7652a479930a06e724f8aa1223d7f273b4e6ff92b356db75a8a7dfb9cf6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
58dbb7652a479930a06e724f8aa1223d7f273b4e6ff92b356db75a8a7dfb9cf6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
58dbb7652a479930a06e724f8aa1223d7f273b4e6ff92b356db75a8a7dfb9cf6
-
Size
55KB
-
MD5
c86502089be5c247bfb90a788ee74fed
-
SHA1
ef313d00d8a2559f54a03cb25a08cbeddf56127d
-
SHA256
58dbb7652a479930a06e724f8aa1223d7f273b4e6ff92b356db75a8a7dfb9cf6
-
SHA512
693aec0b2779268bf12967506d7138377c70612445818c8ed988a9e0881a180b86189a5497a0a27daa1ea1ef5a910bd251068cda6615c124831992943891cc30
-
SSDEEP
768:HvrNNeRBl5JFTXqwXrkgrn/9/HiDKGwRj4RcTdyH4pYT3nPKVU1En4qTdwR8xfA+:ZNeRBl5PT/rx1mzwRMSTdLpJn4qF
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
2