General

  • Target

    https://samples.vx-underground.org/Samples/Families/CryptoFortress/26F13C4AD8C1CCF81E80A556CF6DB0AF.7z

  • Sample

    240425-lcnfgahd47

Malware Config

Targets

    • Target

      https://samples.vx-underground.org/Samples/Families/CryptoFortress/26F13C4AD8C1CCF81E80A556CF6DB0AF.7z

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Impact

Inhibit System Recovery

2
T1490

Tasks