General
-
Target
PowerPoint Presentation.exe
-
Size
3.9MB
-
Sample
241018-j9p98awgnh
-
MD5
65b4f971bda7abcb0bafd3c150d4c7fb
-
SHA1
04cb42549c57ace1fb3edb0a5dbdfeb3c3069fa8
-
SHA256
5f5ff4b40cbcaa1922811c43aaab17d6a71207e7775ed8bc68ae47a4463eb7be
-
SHA512
3942f9821ba9d80480d06d9eb3f76fdb63e302e0ccedbf7601bc3235bfab68703f5b30685726aafe5adcb0816118d696949d452498fc57c4799262e477b483df
-
SSDEEP
98304:E7NUcuNI0SaX/IdKH0Jxbxz9kqXf0Fh+Ev7Z8vpXS5:E7NF73g/IfJxbxBkSIh+Ev7mRS
Static task
static1
Behavioral task
behavioral1
Sample
PowerPoint Presentation.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\g6QpgrhJDdQZeF0\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
PowerPoint Presentation.exe
-
Size
3.9MB
-
MD5
65b4f971bda7abcb0bafd3c150d4c7fb
-
SHA1
04cb42549c57ace1fb3edb0a5dbdfeb3c3069fa8
-
SHA256
5f5ff4b40cbcaa1922811c43aaab17d6a71207e7775ed8bc68ae47a4463eb7be
-
SHA512
3942f9821ba9d80480d06d9eb3f76fdb63e302e0ccedbf7601bc3235bfab68703f5b30685726aafe5adcb0816118d696949d452498fc57c4799262e477b483df
-
SSDEEP
98304:E7NUcuNI0SaX/IdKH0Jxbxz9kqXf0Fh+Ev7Z8vpXS5:E7NF73g/IfJxbxBkSIh+Ev7mRS
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Modifies WinLogon for persistence
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2383) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Contacts a large (1120) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1