Resubmissions

18-07-2024 14:21

240718-rpea8ascqn 1

18-07-2024 14:09

240718-rf8tgasakl 10

General

  • Target

    S1_E2_animation OG.txt

  • Size

    3KB

  • Sample

    240718-rf8tgasakl

  • MD5

    a306a7a50aa416c57cddef28ad6f85e8

  • SHA1

    740abe46c4c4fd8ed03942ab76aba8eb7953124b

  • SHA256

    cd0f51bb462adbc4295c75acada5f398b8f044ffb04f14796cf3b95a4b94ad8e

  • SHA512

    c2f0b9d30a9036d73f6678e7b59daaeaa2395731df34c6ed274261f2a7ca3f0a812d2fb4e08bfd4d98630b5248dd28e87df8daaf5ba391fed51b11dafd4302ec

Malware Config

Targets

    • Target

      S1_E2_animation OG.txt

    • Size

      3KB

    • MD5

      a306a7a50aa416c57cddef28ad6f85e8

    • SHA1

      740abe46c4c4fd8ed03942ab76aba8eb7953124b

    • SHA256

      cd0f51bb462adbc4295c75acada5f398b8f044ffb04f14796cf3b95a4b94ad8e

    • SHA512

      c2f0b9d30a9036d73f6678e7b59daaeaa2395731df34c6ed274261f2a7ca3f0a812d2fb4e08bfd4d98630b5248dd28e87df8daaf5ba391fed51b11dafd4302ec

    • CryptoLocker

      Ransomware family with multiple variants.

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (592) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks