General
-
Target
30c37b87e0c2766673a76da0480acfb6e8292ee54f6de357427159dbd7e0299d
-
Size
39KB
-
Sample
240419-wx5klabg44
-
MD5
242f43c541ab0be3f1a17eb85c5e7320
-
SHA1
16bcd8a3d58e8f49e48150d2a324c797fb17a71e
-
SHA256
30c37b87e0c2766673a76da0480acfb6e8292ee54f6de357427159dbd7e0299d
-
SHA512
b61b133daedfad21b3118f8041da0d456e767c4b4665430c96060881249cb194695996655f0fe0211f35fbfe40fbbee16f9a4890151304a8a695e7dc2b4ab523
-
SSDEEP
768:kYjGlLuJkN3Jalf8dxPBc16C++1HYqg1MRIcDLGhbYG8kRGiXffZ9idohv5RQK2:kY6lyWnalf8d1BcMC1Lgw3DLGhbj8qDo
Static task
static1
Behavioral task
behavioral1
Sample
0385dd2419adf0fe1a1e5d5ed28aaecbceb1411010fb06a1b0798d84eca4732e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0385dd2419adf0fe1a1e5d5ed28aaecbceb1411010fb06a1b0798d84eca4732e.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
0385dd2419adf0fe1a1e5d5ed28aaecbceb1411010fb06a1b0798d84eca4732e
-
Size
55KB
-
MD5
e79a0ff95197b185ba8c04e73b33770d
-
SHA1
66a0c740be5d70840da4f57aa4b01818424a0b13
-
SHA256
0385dd2419adf0fe1a1e5d5ed28aaecbceb1411010fb06a1b0798d84eca4732e
-
SHA512
9c2d6f5026b66b8682bd4561a57d7b30c6a1e0d52ef482539ed249aa90810c23d18aaa6002820fb31cd884ae977f56534982a7eb85d341b10e62dbca374e97de
-
SSDEEP
768:1vrNNeRBl5JFTXqwXrkgrn/9/HiDKGwRj4RcTdyH4pYT3nPKVU1E5mGF9rLG:nNeRBl5PT/rx1mzwRMSTdLpJ5XPrL
Score10/10-
Modifies boot configuration data using bcdedit
-
Renames multiple (311) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
2