Resubmissions

01-05-2024 18:26

240501-w3bjpsfe33 10

General

  • Target

    sample

  • Size

    20KB

  • Sample

    240501-w3bjpsfe33

  • MD5

    efd8184505de45f5d4e7e82f7c887ec6

  • SHA1

    3329f0c3c6d6eec149808c03a13a0b4bf63cb6e7

  • SHA256

    7883074b12c8699252c28d65cedd257056fabe1f4e29d4e0dc2e725d68a70880

  • SHA512

    b834b4596e86648a8ecfd93e9c996231972d13b623c18c86d82654a1764b56cda72aaf8a2eda2b98e7d9cbf316f7ae059e0c7a85ac75e13edd07491fdf7afc78

  • SSDEEP

    384:rGUtcinm6MDpmReVoOs4mi9ylKeGMuUoUHhhb+iq7QS2LjMrSG+TIJCgMmVn:rGQcinhMBVoOs4mmyI1MQUBhbxM0MrS4

Malware Config

Targets

    • Target

      sample

    • Size

      20KB

    • MD5

      efd8184505de45f5d4e7e82f7c887ec6

    • SHA1

      3329f0c3c6d6eec149808c03a13a0b4bf63cb6e7

    • SHA256

      7883074b12c8699252c28d65cedd257056fabe1f4e29d4e0dc2e725d68a70880

    • SHA512

      b834b4596e86648a8ecfd93e9c996231972d13b623c18c86d82654a1764b56cda72aaf8a2eda2b98e7d9cbf316f7ae059e0c7a85ac75e13edd07491fdf7afc78

    • SSDEEP

      384:rGUtcinm6MDpmReVoOs4mi9ylKeGMuUoUHhhb+iq7QS2LjMrSG+TIJCgMmVn:rGQcinhMBVoOs4mmyI1MQUBhbxM0MrS4

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • mimikatz is an open source tool to dump credentials on Windows

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Modifies Windows Firewall

    • Sets file execution options in registry

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

8
T1112

Impair Defenses

3
T1562

Disable or Modify Tools

2
T1562.001

Disable or Modify System Firewall

1
T1562.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

3
T1490

Tasks