General
-
Target
https://t.co/lFkyYFExEH
-
Sample
241010-xk3e5swgqj
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.co/lFkyYFExEH
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
https://t.co/lFkyYFExEH
-
Renames multiple (30727) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Boot or Logon Autostart Execution: Print Processors
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1