Resubmissions

18-07-2024 14:21

240718-rpea8ascqn 1

18-07-2024 14:09

240718-rf8tgasakl 10

General

  • Target

    S1_E2_animation OG.txt

  • Size

    3KB

  • Sample

    240718-rf8tgasakl

  • MD5

    a306a7a50aa416c57cddef28ad6f85e8

  • SHA1

    740abe46c4c4fd8ed03942ab76aba8eb7953124b

  • SHA256

    cd0f51bb462adbc4295c75acada5f398b8f044ffb04f14796cf3b95a4b94ad8e

  • SHA512

    c2f0b9d30a9036d73f6678e7b59daaeaa2395731df34c6ed274261f2a7ca3f0a812d2fb4e08bfd4d98630b5248dd28e87df8daaf5ba391fed51b11dafd4302ec

Malware Config

Targets

    • Target

      S1_E2_animation OG.txt

    • Size

      3KB

    • MD5

      a306a7a50aa416c57cddef28ad6f85e8

    • SHA1

      740abe46c4c4fd8ed03942ab76aba8eb7953124b

    • SHA256

      cd0f51bb462adbc4295c75acada5f398b8f044ffb04f14796cf3b95a4b94ad8e

    • SHA512

      c2f0b9d30a9036d73f6678e7b59daaeaa2395731df34c6ed274261f2a7ca3f0a812d2fb4e08bfd4d98630b5248dd28e87df8daaf5ba391fed51b11dafd4302ec

    • CryptoLocker

      Ransomware family with multiple variants.

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (592) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Windows Management Instrumentation

1
T1047

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Image File Execution Options Injection

1
T1546.012

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Image File Execution Options Injection

1
T1546.012

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

4
T1562

Disable or Modify Tools

2
T1562.001

Disable or Modify System Firewall

1
T1562.004

Safe Mode Boot

1
T1562.009

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Direct Volume Access

1
T1006

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Impact

Inhibit System Recovery

3
T1490

Tasks