Resubmissions
04-07-2024 11:28
240704-nlal3sycra 1003-07-2024 20:16
240703-y2dnsaxflh 303-07-2024 20:08
240703-ywwmeawbnp 1003-07-2024 20:07
240703-ywad6sxdqg 303-07-2024 20:02
240703-ysff1swakk 603-07-2024 20:02
240703-yr5draxcng 303-07-2024 20:01
240703-yryk7sxcna 303-07-2024 19:57
240703-ypp62sxbne 303-07-2024 19:55
240703-ynf7ravgnn 3General
-
Target
AutoDox.exe
-
Size
81KB
-
Sample
240704-nlal3sycra
-
MD5
ec51cfbde4a4df4eceb8313adf8d93ca
-
SHA1
f8925a067c34ab1b0e7da2de961af20247ace3fa
-
SHA256
aef13f3ec8abf777929e42aa3de86774ab8362f7fbfcc0475c7b912ce253c002
-
SHA512
1cc6c73c33ce6d00c102f9ed3c6733c532f131b00761fd4ff59cda87c560e3ce3e06dfcbb8a886976ae5084c9d36c3f02d9afefca5b1403c20b53735fe24bada
-
SSDEEP
1536:9rsgf4VFHlI++UIoyjyCL6sf+Fle8Ifvl1loJbh76e:ClI++UIZIsf+Fle8Ift1loJbh76
Static task
static1
Behavioral task
behavioral1
Sample
AutoDox.exe
Resource
win11-20240419-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
AutoDox.exe
-
Size
81KB
-
MD5
ec51cfbde4a4df4eceb8313adf8d93ca
-
SHA1
f8925a067c34ab1b0e7da2de961af20247ace3fa
-
SHA256
aef13f3ec8abf777929e42aa3de86774ab8362f7fbfcc0475c7b912ce253c002
-
SHA512
1cc6c73c33ce6d00c102f9ed3c6733c532f131b00761fd4ff59cda87c560e3ce3e06dfcbb8a886976ae5084c9d36c3f02d9afefca5b1403c20b53735fe24bada
-
SSDEEP
1536:9rsgf4VFHlI++UIoyjyCL6sf+Fle8Ifvl1loJbh76e:ClI++UIZIsf+Fle8Ift1loJbh76
-
Detect rhadamanthys stealer shellcode
-
Modifies WinLogon for persistence
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
7