General
-
Target
Frozen_cracked.exe
-
Size
784KB
-
Sample
240629-ranw4syflg
-
MD5
26348de5340c8ec99091699776a2027a
-
SHA1
3d004406d2467af78f90aaaf3312839e83a43883
-
SHA256
f25d3ed9eab66e7c08fd2c2778bab2319631bbcff3bb08415604e0c27b002b24
-
SHA512
08ca1b4a82c9ceeb604533d3622a6864083288bc86046ba7e2d20639d5fcf2605eefe06a3adb9952415ecab8f42f647b76ae540d2d4e235b7ac0967de851bb78
-
SSDEEP
12288:mijyh17Ln+wwu2LjKDYsXCuQN/MGHaF9Eq2U3u:+h1Xnf4jcYsSpMGHaEq2uu
Static task
static1
Behavioral task
behavioral1
Sample
Frozen_cracked.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Frozen_cracked.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
Frozen_cracked.exe
-
Size
784KB
-
MD5
26348de5340c8ec99091699776a2027a
-
SHA1
3d004406d2467af78f90aaaf3312839e83a43883
-
SHA256
f25d3ed9eab66e7c08fd2c2778bab2319631bbcff3bb08415604e0c27b002b24
-
SHA512
08ca1b4a82c9ceeb604533d3622a6864083288bc86046ba7e2d20639d5fcf2605eefe06a3adb9952415ecab8f42f647b76ae540d2d4e235b7ac0967de851bb78
-
SSDEEP
12288:mijyh17Ln+wwu2LjKDYsXCuQN/MGHaF9Eq2U3u:+h1Xnf4jcYsSpMGHaEq2uu
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies Windows Firewall
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
1