General
-
Target
000db71531e5aa8b30594d305bb3fbce8e2c71f66e2170091ef58b3c1f306f46 (1).zip
-
Size
39KB
-
Sample
241016-vrexba1dre
-
MD5
0a966e866c11b7082837ea7f6202a885
-
SHA1
0006a3c65a0445ffe8f10080e4eb687eb097c183
-
SHA256
ccfaba472d2e6d1ee23eee843782da4982246bf2b7582a39937ce846818c8036
-
SHA512
48c0ef80abf959c5ca647e3f7206fb35bb40cbf2d09d2791dcd0274b9e3cd100541af2c6232844ee42116259da5847b8aefef0eb6df9e9c404bb6205d9a7974d
-
SSDEEP
768:qmR06a1ViTVz3OR+CTJtoFjTnHKKRSowUTZFpEM3vClNJ:L4iJzefvoFnnqKkMvCfJ
Static task
static1
Behavioral task
behavioral1
Sample
000db71531e5aa8b30594d305bb3fbce8e2c71f66e2170091ef58b3c1f306f46.exe
Resource
win11-20241007-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
000db71531e5aa8b30594d305bb3fbce8e2c71f66e2170091ef58b3c1f306f46.exe
-
Size
55KB
-
MD5
ea6d3083f8c1c506fbff457bf09a7ed8
-
SHA1
f159c4fc7d13571e725f0ae9e0749c77cf859b4e
-
SHA256
000db71531e5aa8b30594d305bb3fbce8e2c71f66e2170091ef58b3c1f306f46
-
SHA512
1167b9ebe03c399c5915394592f97ce60bd07e92f589a4a0d794255c7a9c46423dd28efbf96b45aab6a67763a20676627f35683cc6790bf1383c7f07b6e28405
-
SSDEEP
1536:ENeRBl5PT/rx1mzwRMSTdLpJVIVAxN/0nVS12:EQRrmzwR5JiWxNIJ
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (550) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1