General
-
Target
c35eb7caf91eecce8ecf129eec3ff8652e72cf31f86ed45ea6ea4a5140acf680
-
Size
254KB
-
Sample
240901-sr4jkavbkj
-
MD5
28df2c8790283fabdf0b305ef631eefa
-
SHA1
bf290b4b19ee619c278cd24182eef67565710a04
-
SHA256
c35eb7caf91eecce8ecf129eec3ff8652e72cf31f86ed45ea6ea4a5140acf680
-
SHA512
6baaccff46c15281351fd4cba5323ad40a34095dc6b4a24fc8b029390bed47c8297e91bee7247ebed046ab1a058a0147ac4e41db48d4f649ecfe624662df39e8
-
SSDEEP
6144:HG9TomNr+ufSIMVygorNQiyoGB0i4hDtzvrREKtyfRg8po:HGM2KufexKuiqmi4/zvtEKH8S
Static task
static1
Behavioral task
behavioral1
Sample
3bf44eb9dbe5252e59ca8b680507ad63d3af583f6a4ffe641a563fd3c8040146.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3bf44eb9dbe5252e59ca8b680507ad63d3af583f6a4ffe641a563fd3c8040146.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
3bf44eb9dbe5252e59ca8b680507ad63d3af583f6a4ffe641a563fd3c8040146
-
Size
315KB
-
MD5
dc25873587082324e388be35b9a82127
-
SHA1
b091e1bac14c016dbbd6c905df53aacbb1eb0167
-
SHA256
3bf44eb9dbe5252e59ca8b680507ad63d3af583f6a4ffe641a563fd3c8040146
-
SHA512
d2ecae3c0451ebc51e40900690eae81a5ee2773bf1e0e1ce005d541aa989b7dfe50d35bc0f4f9fb08d5c3ce3b6f8b2b8451f2791ef1cd84547354b5567b92503
-
SSDEEP
6144:zmqMCYsOIVd8L0asTL+X2ihIPIYAOuKcP5WI0OYcd:zmlJs4sPxncRWrOTd
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (52) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4