General
-
Target
fffddsfdsgfd.png
-
Size
82KB
-
Sample
240709-rj642sxfqk
-
MD5
d586f6d0e6532c1e30c420f7167856bd
-
SHA1
2b3cd081d870b29df1f6249f3f50d890321bb983
-
SHA256
21df242a377d7ddea14251178bb29a2300c8535eac6bdde541f910f709472223
-
SHA512
3f3dc9059bc45b0ff79ac586a8440a87879168ea5ba8f5d07279e99a072656a15ec6d4b7037dfdd3a1faafc087c982116085a902e057b064fef908098888bf5f
-
SSDEEP
1536:hpk3C1qszuBnQbxe/xRgGbFBH4dCOPEtp7VpRKYlkUTZMdFsiHyfc0Nz196:A3ASBQbxsfg8Fh4dC4WpXRV1ZiSkS96
Static task
static1
Behavioral task
behavioral1
Sample
fffddsfdsgfd.png
Resource
win10-20240404-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:111
25f7eeb75e53b74dd2777060376f78f3
-
reg_key
25f7eeb75e53b74dd2777060376f78f3
-
splitter
|'|'|
Extracted
njrat
0.7d
slave
127.0.0.1:111
7ed27061f4d1ca6d9a32b0e33d0d0084
-
reg_key
7ed27061f4d1ca6d9a32b0e33d0d0084
-
splitter
Y262SUCZ4UJJ
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
fffddsfdsgfd.png
-
Size
82KB
-
MD5
d586f6d0e6532c1e30c420f7167856bd
-
SHA1
2b3cd081d870b29df1f6249f3f50d890321bb983
-
SHA256
21df242a377d7ddea14251178bb29a2300c8535eac6bdde541f910f709472223
-
SHA512
3f3dc9059bc45b0ff79ac586a8440a87879168ea5ba8f5d07279e99a072656a15ec6d4b7037dfdd3a1faafc087c982116085a902e057b064fef908098888bf5f
-
SSDEEP
1536:hpk3C1qszuBnQbxe/xRgGbFBH4dCOPEtp7VpRKYlkUTZMdFsiHyfc0Nz196:A3ASBQbxsfg8Fh4dC4WpXRV1ZiSkS96
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
4Scripting
1