General
-
Target
7ac7d0a8488d1f18acec1a7269dfae80N.exe
-
Size
488KB
-
Sample
240727-bymqys1ene
-
MD5
7ac7d0a8488d1f18acec1a7269dfae80
-
SHA1
ec32f3e25671312eb3a37d965c91a2fd1ec60dcd
-
SHA256
68278808d38276b3ae7751c92ca02e339961cccbdbe5d618105680c9395d615a
-
SHA512
98faa574c665fbd123dd4a6cce534b1871c8d8baab9128aa0630decd196c21ba63e043acdde48be0df1ca2bbfd9f15308f4dac387a6e3b6f7b94514f8f158035
-
SSDEEP
12288:xCsRuyiViUJ9Ue31Jg4Fvd/1Hdi/QCornhrvSqF2W3:xCsRuDVxJ+bm/q2rnh7x2
Static task
static1
Behavioral task
behavioral1
Sample
7ac7d0a8488d1f18acec1a7269dfae80N.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
7ac7d0a8488d1f18acec1a7269dfae80N.exe
-
Size
488KB
-
MD5
7ac7d0a8488d1f18acec1a7269dfae80
-
SHA1
ec32f3e25671312eb3a37d965c91a2fd1ec60dcd
-
SHA256
68278808d38276b3ae7751c92ca02e339961cccbdbe5d618105680c9395d615a
-
SHA512
98faa574c665fbd123dd4a6cce534b1871c8d8baab9128aa0630decd196c21ba63e043acdde48be0df1ca2bbfd9f15308f4dac387a6e3b6f7b94514f8f158035
-
SSDEEP
12288:xCsRuyiViUJ9Ue31Jg4Fvd/1Hdi/QCornhrvSqF2W3:xCsRuDVxJ+bm/q2rnh7x2
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (72) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5