General

  • Target

    pp.exe

  • Size

    7.4MB

  • Sample

    240805-cb7chstdnp

  • MD5

    67e4ed31a1f93cfe8e39fa71c36712aa

  • SHA1

    0b9aaf8d7fc079d5c92999c9e83f78d4cc599e89

  • SHA256

    4e49278775abf88be3be8aa7851cf854b901f1293b6055345d2a6c4ba6bdbf5d

  • SHA512

    b93d86c0c39e9668c1db50035cb7127e8e560e51cf5a925d78769d126dfdcb9df771ed2b1ab8ef68c80860a93a7ec912d105b0569af287a80f683a5cc18589e0

  • SSDEEP

    196608:VU7W4FMIZETKwjPePdrQJiWrBd1WutYPjo:wWQETKwvJiWT1WWao

Malware Config

Targets

    • Target

      pp.exe

    • Size

      7.4MB

    • MD5

      67e4ed31a1f93cfe8e39fa71c36712aa

    • SHA1

      0b9aaf8d7fc079d5c92999c9e83f78d4cc599e89

    • SHA256

      4e49278775abf88be3be8aa7851cf854b901f1293b6055345d2a6c4ba6bdbf5d

    • SHA512

      b93d86c0c39e9668c1db50035cb7127e8e560e51cf5a925d78769d126dfdcb9df771ed2b1ab8ef68c80860a93a7ec912d105b0569af287a80f683a5cc18589e0

    • SSDEEP

      196608:VU7W4FMIZETKwjPePdrQJiWrBd1WutYPjo:wWQETKwvJiWT1WWao

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Disables service(s)

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Modifies Windows Defender Real-time Protection settings

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (190) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks