General
-
Target
RNSM00384.7z
-
Size
56.3MB
-
Sample
241103-14pj6swfpl
-
MD5
600e405b3ca30e918aee2044111b6721
-
SHA1
5855b3ced8b01d2177820f653a3ad7acd371dc22
-
SHA256
a54e2aa0abb5b97d433a8e8fd2bdb2f83c9bef02e2db1695483a8294238adf46
-
SHA512
08bcf977e46a624600662af6b580651a4e9927c9f47670e331531a58990f9440b593c7f5c280736d0cf222830439c796389d7eba0d76bbab12b2bdb3c9fec3ef
-
SSDEEP
1572864:DwJV/DpTapvVBlk01AL78kFRdtEPoSx34382/oMR:gV/JaZRkga39SxO82AO
Static task
static1
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
212121QWER
Extracted
quasar
-
reconnect_delay
3000
Extracted
F:\$RECYCLE.BIN\S-1-5-21-1045960512-3948844814-3059691613-1000\HYEOAMLLU-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/9fca77e1278df339
Extracted
C:\Users\Admin\Desktop\00384\Setting\tvov5Gi3_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\tvov5Gi3_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
\Device\HarddiskVolume1\Boot\cs-CZ\HOW TO DECRYPT FILES.txt
https://we.tl/t-2jkyb95pOj
Extracted
C:\Users\Admin\Desktop\tvov5Gi3_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
F:\$RECYCLE.BIN\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/9fca77e1278df339
Extracted
C:\Users\Admin\Desktop\tvov5Gi3_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\tvov5Gi3_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
RNSM00384.7z
-
Size
56.3MB
-
MD5
600e405b3ca30e918aee2044111b6721
-
SHA1
5855b3ced8b01d2177820f653a3ad7acd371dc22
-
SHA256
a54e2aa0abb5b97d433a8e8fd2bdb2f83c9bef02e2db1695483a8294238adf46
-
SHA512
08bcf977e46a624600662af6b580651a4e9927c9f47670e331531a58990f9440b593c7f5c280736d0cf222830439c796389d7eba0d76bbab12b2bdb3c9fec3ef
-
SSDEEP
1572864:DwJV/DpTapvVBlk01AL78kFRdtEPoSx34382/oMR:gV/JaZRkga39SxO82AO
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon family
-
Avaddon payload
-
Detected Xorist Ransomware
-
Gandcrab family
-
Glupteba family
-
Glupteba payload
-
Modifies WinLogon for persistence
-
Quasar family
-
Quasar payload
-
Xorist family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies boot configuration data using bcdedit
-
Renames multiple (2482) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Safe Mode Boot
1Indicator Removal
3File Deletion
3Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
4Credentials In Files
4Discovery
Peripheral Device Discovery
2Query Registry
7Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2