General

  • Target

    ROBLOJ.exe

  • Size

    1.0MB

  • Sample

    240706-tdj4fawemd

  • MD5

    3e76feff4b59d8b104be9a7720d1a7ec

  • SHA1

    94fcaccde5b90c951df736f1589376b7004d9fbc

  • SHA256

    1fd6dd183483399229dec09d132cc529c980adc410693e3ca501e57eef56b8f3

  • SHA512

    01633703461d8b1a5186be4c82c9ce64a4132935d1a0991c7dc72daeda505751a01b7e23bc95b9b5f5cd08f869727db4e4a8a0bb215d62ba5a1f3da5db93c976

  • SSDEEP

    24576:ySOarS9W3bvZydJgNP6oTV/4RVph1Pdih840JaVh21ejh4USE:ySNyWrRLQHRhpT40JaVgej6USE

Malware Config

Targets

    • Target

      ROBLOJ.exe

    • Size

      1.0MB

    • MD5

      3e76feff4b59d8b104be9a7720d1a7ec

    • SHA1

      94fcaccde5b90c951df736f1589376b7004d9fbc

    • SHA256

      1fd6dd183483399229dec09d132cc529c980adc410693e3ca501e57eef56b8f3

    • SHA512

      01633703461d8b1a5186be4c82c9ce64a4132935d1a0991c7dc72daeda505751a01b7e23bc95b9b5f5cd08f869727db4e4a8a0bb215d62ba5a1f3da5db93c976

    • SSDEEP

      24576:ySOarS9W3bvZydJgNP6oTV/4RVph1Pdih840JaVh21ejh4USE:ySNyWrRLQHRhpT40JaVgej6USE

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Execution

Windows Management Instrumentation

1
T1047

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Access Token Manipulation

1
T1134

Create Process with Token

1
T1134.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

3
T1112

Indicator Removal

2
T1070

File Deletion

2
T1070.004

File and Directory Permissions Modification

1
T1222

Access Token Manipulation

1
T1134

Create Process with Token

1
T1134.002

Direct Volume Access

1
T1006

Impact

Inhibit System Recovery

2
T1490

Service Stop

1
T1489

Defacement

1
T1491

Tasks