General
-
Target
ROBLOJ.exe
-
Size
1.0MB
-
Sample
240706-tdj4fawemd
-
MD5
3e76feff4b59d8b104be9a7720d1a7ec
-
SHA1
94fcaccde5b90c951df736f1589376b7004d9fbc
-
SHA256
1fd6dd183483399229dec09d132cc529c980adc410693e3ca501e57eef56b8f3
-
SHA512
01633703461d8b1a5186be4c82c9ce64a4132935d1a0991c7dc72daeda505751a01b7e23bc95b9b5f5cd08f869727db4e4a8a0bb215d62ba5a1f3da5db93c976
-
SSDEEP
24576:ySOarS9W3bvZydJgNP6oTV/4RVph1Pdih840JaVh21ejh4USE:ySNyWrRLQHRhpT40JaVgej6USE
Behavioral task
behavioral1
Sample
ROBLOJ.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
ROBLOJ.exe
-
Size
1.0MB
-
MD5
3e76feff4b59d8b104be9a7720d1a7ec
-
SHA1
94fcaccde5b90c951df736f1589376b7004d9fbc
-
SHA256
1fd6dd183483399229dec09d132cc529c980adc410693e3ca501e57eef56b8f3
-
SHA512
01633703461d8b1a5186be4c82c9ce64a4132935d1a0991c7dc72daeda505751a01b7e23bc95b9b5f5cd08f869727db4e4a8a0bb215d62ba5a1f3da5db93c976
-
SSDEEP
24576:ySOarS9W3bvZydJgNP6oTV/4RVph1Pdih840JaVh21ejh4USE:ySNyWrRLQHRhpT40JaVgej6USE
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Modifies file permissions
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix ATT&CK v13
Execution
Windows Management Instrumentation
1System Services
1Service Execution
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Access Token Manipulation
1Create Process with Token
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Indicator Removal
2File Deletion
2File and Directory Permissions Modification
1Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1