General

  • Target

    NVIDIA_app_beta_v10.0.2.207.exe

  • Size

    138.4MB

  • Sample

    240817-xknlzs1dng

  • MD5

    9c403f118254979375ae52e379f09c10

  • SHA1

    141e8ff877a17982700151f5000b0f2bc72e7f5f

  • SHA256

    8c9ccbb9fab41981472cc2e97c1c10493a43f32ac87d078bad489badd18ef430

  • SHA512

    ac6a0b0736d4ffeb2b597606b3a341a00187af91db134efe377a4480c5790bb3ff9ca77dbfa398bc144c09940d76c015fb8531d69360b00acf6832166b4194d7

  • SSDEEP

    3145728:FHd2WkwehafKlETBwDCpAxTtpZflLxRjsvl:FAHMKl+wDwAVx9L7Wl

Malware Config

Extracted

Path

C:\NVIDIA\NVAPP2\FrameViewSDK\SDK\Public_Release\_R_E_A_D___T_H_I_S___ELEN20_.hta

Family

cerber

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;: Instructi&#111;ns</title> <HTA:APPLICATION APPLICATIONNAME="LOjSwnYhM" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style type="text/css"> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .h { display: none; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; padding-left: 35px; background: url("data:image/gif;base64,R0lGODlhGQAZAKIEAMzMzJmZmTMzM2ZmZgAAAAAAAAAAAAAAACH/C05FVFNDQVBFMi4wAwEAAAAh+QQFAAAEACwAAAAAGQAZAAADVki63P4wSEiZvLXemRf4yhYoQ0l9aMiVLISCDms+L/DIwwnfc+c3qZ9g6Hn5hkhF7YgUKI2dpvNpExJ/WKquSoMCvd9geDeuBpcuGFrcQWep5Df7jU0AACH5BAUAAAQALAoAAQAOABQAAAMwSLDU/iu+Gdl0FbTAqeXg5YCdSJCBuZVqKw5wC8/qHJv2IN+uKvytn9AnFBCHx0cCACH5BAUAAAQALAoABAAOABQAAAMzSLoEzrC5F9Wk9YK6Jv8gEYzgaH4myaVBqYbfIINyHdcDI+wKniu7YG+2CPI4RgFI+EkAACH5BAUAAAQALAQACgAUAA4AAAMzSLrcBNDJBeuUNd6WwXbWtwnkFZwMqUpnu6il06IKLChDrsxBGufAHW0C1IlwxeMieEkAACH5BAUAAAQALAEACgAUAA4AAAM0SLLU/lAtFquctk6aIe5gGA1kBpwPqVZn66hl1KINPDRB3sxAGufAHc0C1IkIxcARZ4QkAAAh+QQFAAAEACwBAAQADgAUAAADMUhK0vurSfiko8oKHC//yyCCYvmVI4cOZAq+UCCDcv3VM4cHCuDHOZ/wI/xxigDQMAEAIfkEBQAABAAsAQABAA4AFAAAAzNIuizOkLgZ13xraHVF1puEKWBYlUP1pWrLBLALz+0cq3Yg324PAUAXcNgaBlVGgPAISQAAIfkEBQAABAAsAQABABQADgAAAzRIujzOMBJHpaXPksAVHoogMlzpZWK6lF2UjgobSK9AtjSs7QTg8xCfELgQ/og9I1IxXCYAADs=") left no-repeat; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a id="change_language" href="#" onclick="return changeLanguage1();" title="English">&#9745; English</a> <h1>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return sh_bl('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return sh_bl('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return sh_bl('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return sh_bl('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return sh_bl('fr');">Français</a></li> <li><a href="#" title="German" onclick="return sh_bl('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return sh_bl('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return sh_bl('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return sh_bl('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return sh_bl('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return sh_bl('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return sh_bl('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return sh_bl('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't yo<span class="h">CSa1cPyv</span>u find the necessary files?<br>Is the c<span class="h">wlBK2</span>ontent of your files not readable?</p> <p>It is normal be<span class="h">poJc2</span>cause the files' names and the data in your files have been encryp<span class="h">74U</span>ted by "Ce<span class="h">QgJkVhs</span>r&#98;er&nbsp;Rans&#111;mware".</p> <p>It me<span class="h">ssu</span>ans your files are NOT damage<span class="h">MV5yerqb1t</span>d! Your files are modified only. This modification is reversible.<br>F<span class="h">zjYRTio</span>rom now it is not poss<span class="h">Q</span>ible to use your files until they will be decrypted.</p> <p>The only way to dec<span class="h">bPD</span>rypt your files safely is to &#98;uy the special decryption software "C<span class="h">4LE</span>er&#98;er&nbsp;Decryptor".</p> <p>Any attempts to rest<span class="h">scF</span>ore your files with the thir<span class="h">icOdVAM</span>d-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proc<span class="h">pL</span>eed with purchasing of the decryption softw<span class="h">RFxIbClr</span>are at your personal page:</p> <p><span class="info"><span class="updating">Ple<span class="h">RPTO</span>ase wait...</span><a class="url" href="http://p27dokhpz2n7nvgr.12hygy.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.12hygy.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.14ewqv.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.14ewqv.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.14vvrc.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.14vvrc.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.129p1t.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.129p1t.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.1apgrn.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.1apgrn.top/7C39-9D3F-1BFE-0446-9F94</a></span></p> <p>If t<span class="h">gQ7WM96H</span>his page cannot be opened &nbsp;<span class="button" onclick="return _url_upd_('en');">cli<span class="h">jRy5ASw</span>ck here</span>&nbsp; to get a new addr<span class="h">pZZELko</span>ess of your personal page.<br><br>If the addre<span class="h">qSg1sQG1x</span>ss of your personal page is the same as befo<span class="h">fkS5bkl</span>re after you tried to get a new one,<br>you c<span class="h">wYQ7f</span>an try to get a new address in one hour.</p> <p>At th<span class="h">4YboMO3</span>is p&#097;ge you will receive the complete instr<span class="h">pBvtQ</span>uctions how to buy the decrypti<span class="h">2lebWflOg</span>on software for restoring all your files.</p> <p>Also at this p&#097;ge you will be able to res<span class="h">kIedV</span>tore any one file for free to be sure "Cer&#98;e<span class="h">abj</span>r&nbsp;Decryptor" will help you.</p> <hr> <p>If your per<span class="h">Byvc2CJk</span>sonal page is not availa<span class="h">G3VlwzKn</span>ble for a long period there is another way to open your personal page - insta<span class="h">pV2I</span>llation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Inte<span class="h">AcE2juwu</span>rnet browser (if you do not know wh&#097;t it is run the Internet&nbsp;Explorer);</li> <li>ent<span class="h">kZ</span>er or copy the &#097;ddress <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/downlo&#097;d/download-easy.html.en</a> into the address bar of your browser &#097;nd press ENTER;</li> <li>wait for the site load<span class="h">iJx0gMD</span>ing;</li> <li>on the site you will be offered to do<span class="h">VeemzVlW</span>wnload Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>ru<span class="h">3aKkS</span>n Tor&nbsp;Browser;</li> <li>connect with the butt<span class="h">OtAZMjlPbm</span>on "Connect" (if you use the English version);</li> <li>a normal Internet bro<span class="h">zitnqOC</span>wser window will be opened &#097;fter the initialization;</li> <li>type or copy the add<span class="h">T</span>ress <br><span class="info">http://p27dokhpz2n7nvgr.onion/7C39-9D3F-1BFE-0446-9F94</span><br> in this browser address bar;</li> <li>pre<span class="h">646GCxt</span>ss ENTER;</li> <li>the site sho<span class="h">9uN6X</span>uld be loaded; if for some reason the site is not lo<span class="h">oQ0EGqTxL</span>ading wait for a moment and try again.</li> </ol> <p>If you have any pr<span class="h">Pq5g3Y0</span>oblems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the searc<span class="h">LWaUOgCjYQ</span>h bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Addit<span class="h">Cat7G2</span>ional information:</strong></p> <p>You will fi<span class="h">E0vzJfzz</span>nd the instru<span class="h">k</span>cti&#111;ns ("*_READ_THIS_FILE_*.hta") for re<span class="h">I5hT4L8k6</span>st&#111;ring y&#111;ur files in &#097;ny f<span class="h">hFWZ</span>&#111;lder with your enc<span class="h">ycv</span>rypted files.</p> <p>The instr<span class="h">KdYFZuzY</span>ucti&#111;ns "*_READ_THIS_FILE_*.hta" in the f<span class="h">LSSHt2o7YT</span>&#111;lder<span class="h">X7X</span>s with your encry<span class="h">Lj</span>pted files are not vir<span class="h">adpoilBj7l</span>uses! The instruc<span class="h">nlaFXgilAb</span>tions "*_READ_THIS_FILE_*.hta" will he<span class="h">qMywcqX</span>lp you to dec<span class="h">eLP8NCRO</span>rypt your files.</p> <p>Remembe<span class="h">VM4oA</span>r! The w&#111;rst si<span class="h">PhuhAg</span>tu&#097;tion already happ<span class="h">dzGfzo4QiC</span>ened and n&#111;w the future of your files de<span class="h">Aq</span>pends on your determ<span class="h">8yIdrU</span>ination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cer&#98;er&nbsp;Rans&#111;mware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cer&#98;er&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://p27dokhpz2n7nvgr.12hygy.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.12hygy.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.14ewqv.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.14ewqv.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.14vvrc.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.14vvrc.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.129p1t.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.129p1t.top/7C39-9D3F-1BFE-0446-9F94</a><hr><a href="http://p27dokhpz2n7nvgr.1apgrn.top/7C39-9D3F-1BFE-0446-9F94" target="_blank">http://p27dokhpz2n7nvgr.1apgrn.top/7C39-9D3F-1BFE-0446-9F94</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return _url_upd_('ar');">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cer&#98;er&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://p27dokhpz2n7nvgr.onion/7C39-9D3F-1BFE-0446-9F94</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إض<span class="h">Dil1GAjw</span>افية:</strong></p> <p>س<span class="h">cty2BK</span>وف تجد إرشادات استعادة الملفات الخاصة بك ("*_READ_THIS_FILE_*") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرش<span class="h">fvUZ9jee</span>ادات ("*_READ_THIS_FILE_*") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*_READ_THIS_FILE_*") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ مو<span class="h">xxKiBMdOa</span>قف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cer&#98;er&nbsp;Rans&#111;mware”加密了。</p> <p>这意味着您的文件并��

Extracted

Path

C:\NVIDIA\NVAPP2\FrameViewSDK\licenses\_R_E_A_D___T_H_I_S___8JU3GXZT_.txt

Family

cerber

Ransom Note
CERBER RANSOMWARE ----- YOUR DOCUMENTS, PH0TOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only way to decrypt y0ur files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_READ_THIS_FILE_*) with complete instructions how to decrypt your files. If you cannot find any (*_READ_THIS_FILE_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://p27dokhpz2n7nvgr.onion/7C39-9D3F-1BFE-0446-9F94 Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://p27dokhpz2n7nvgr.12hygy.top/7C39-9D3F-1BFE-0446-9F94 2. http://p27dokhpz2n7nvgr.14ewqv.top/7C39-9D3F-1BFE-0446-9F94 3. http://p27dokhpz2n7nvgr.14vvrc.top/7C39-9D3F-1BFE-0446-9F94 4. http://p27dokhpz2n7nvgr.129p1t.top/7C39-9D3F-1BFE-0446-9F94 5. http://p27dokhpz2n7nvgr.1apgrn.top/7C39-9D3F-1BFE-0446-9F94 ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://p27dokhpz2n7nvgr.onion/7C39-9D3F-1BFE-0446-9F94

http://p27dokhpz2n7nvgr.12hygy.top/7C39-9D3F-1BFE-0446-9F94

http://p27dokhpz2n7nvgr.14ewqv.top/7C39-9D3F-1BFE-0446-9F94

http://p27dokhpz2n7nvgr.14vvrc.top/7C39-9D3F-1BFE-0446-9F94

http://p27dokhpz2n7nvgr.129p1t.top/7C39-9D3F-1BFE-0446-9F94

http://p27dokhpz2n7nvgr.1apgrn.top/7C39-9D3F-1BFE-0446-9F94

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      NVIDIA_app_beta_v10.0.2.207.exe

    • Size

      138.4MB

    • MD5

      9c403f118254979375ae52e379f09c10

    • SHA1

      141e8ff877a17982700151f5000b0f2bc72e7f5f

    • SHA256

      8c9ccbb9fab41981472cc2e97c1c10493a43f32ac87d078bad489badd18ef430

    • SHA512

      ac6a0b0736d4ffeb2b597606b3a341a00187af91db134efe377a4480c5790bb3ff9ca77dbfa398bc144c09940d76c015fb8531d69360b00acf6832166b4194d7

    • SSDEEP

      3145728:FHd2WkwehafKlETBwDCpAxTtpZflLxRjsvl:FAHMKl+wDwAVx9L7Wl

    • Cerber

      Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Contacts a large (1249) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Uses Session Manager for persistence

      Creates Session Manager registry key to run executable early in system boot.

    • Drops startup file

    • Impair Defenses: Safe Mode Boot

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies Windows Firewall

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks