Resubmissions

10-08-2024 18:29

240810-w4wk9s1hpk 7

10-08-2024 18:13

240810-wts3dsvgnb 10

General

  • Target

    VirtualBox-7.0.20-163906-Win.exe

  • Size

    105.1MB

  • Sample

    240810-wts3dsvgnb

  • MD5

    b822835698e76fff193342effc92d286

  • SHA1

    e049adb24caf0153b94e801da9835d485c67e38c

  • SHA256

    fa3544162eee87b660999bd913f76ccb2e5a706928ef2c2e29811e4ac76fb166

  • SHA512

    0381b27478dc25d4b3707fb21a34be66ca42eb18d93ce8ec90be7325015f540a39ebfea58b7992a38cc2c861e6e86d89c67f5b3a84ddb65e339fcca0dc314bed

  • SSDEEP

    3145728:VuwDpzeIGwA7iKVCv8hxxgFYHey3WCfEOiP1e48TetH+H9:VuwDpz9A70Cno1XZBtHC9

Malware Config

Targets

    • Target

      VirtualBox-7.0.20-163906-Win.exe

    • Size

      105.1MB

    • MD5

      b822835698e76fff193342effc92d286

    • SHA1

      e049adb24caf0153b94e801da9835d485c67e38c

    • SHA256

      fa3544162eee87b660999bd913f76ccb2e5a706928ef2c2e29811e4ac76fb166

    • SHA512

      0381b27478dc25d4b3707fb21a34be66ca42eb18d93ce8ec90be7325015f540a39ebfea58b7992a38cc2c861e6e86d89c67f5b3a84ddb65e339fcca0dc314bed

    • SSDEEP

      3145728:VuwDpzeIGwA7iKVCv8hxxgFYHey3WCfEOiP1e48TetH+H9:VuwDpz9A70Cno1XZBtHC9

    • CryptoLocker

      Ransomware family with multiple variants.

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies Windows Firewall

    • Drops file in System32 directory

    • Modifies WinLogon for persistence

MITRE ATT&CK Enterprise v15

Tasks