General
-
Target
sample
-
Size
19KB
-
Sample
240605-weml3aed26
-
MD5
794cfcc148a7c97e3c23faa8c41c0410
-
SHA1
5e1546164a56e61a1f4ef16960cb88e965606501
-
SHA256
a6aad5cd9bad145d88781420e8e608ca89b10873e919a9784fc9917600c78237
-
SHA512
5443edaef0e7add7ed1084685827f678082796c77fc700700bf2b34c9c0e1def4ebd9f243be5f05d0a9088f86aed04aa89fc882ba238ab843193488aed9b51e5
-
SSDEEP
384:r2SncKmGDpmReVoOs4Ni9ylKeGMPU8Hhhbr1I7yo2paWhOwob07+h28JCdJn1:r2ScxGBVoOs4NmyI1M3BhbpmLWhOwoby
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
sample
-
Size
19KB
-
MD5
794cfcc148a7c97e3c23faa8c41c0410
-
SHA1
5e1546164a56e61a1f4ef16960cb88e965606501
-
SHA256
a6aad5cd9bad145d88781420e8e608ca89b10873e919a9784fc9917600c78237
-
SHA512
5443edaef0e7add7ed1084685827f678082796c77fc700700bf2b34c9c0e1def4ebd9f243be5f05d0a9088f86aed04aa89fc882ba238ab843193488aed9b51e5
-
SSDEEP
384:r2SncKmGDpmReVoOs4Ni9ylKeGMPU8Hhhbr1I7yo2paWhOwob07+h28JCdJn1:r2ScxGBVoOs4NmyI1M3BhbpmLWhOwoby
Score9/10-
Renames multiple (125) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1