General
-
Target
0d87ba1290e9b29d1f1d3cbf7bc06992.LHA
-
Size
778KB
-
Sample
241107-cq8h5avrbq
-
MD5
0d87ba1290e9b29d1f1d3cbf7bc06992
-
SHA1
4a4b025cdd9c7e5414b6d1b6fc3bd68446a3cfe5
-
SHA256
dd48521142eddeff589404be6780f58bcdc07c0e4e4348f19ec84d73adaffb25
-
SHA512
f231e7bcc27188dfaf11997a6887e33f794d03101fd0a8aa5043f5fa8151cd3b157dd5cdec94c3a77d5fe93813cbf5a2818e4cc5885313e27e0250e70da20230
-
SSDEEP
24576:WQdso+guKotxr/P/mwHAvBmbiYczbodD//UJS4:x7uKCN3/lGmbiY4uDHUx
Static task
static1
Behavioral task
behavioral1
Sample
procesosCUI7254178000020150023000.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
procesosCUI7254178000020150023000.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
procesosCUI7254178000020150023000.exe
-
Size
908KB
-
MD5
e93703d8357807ba8be42ce5bd71d99b
-
SHA1
f557b727748f4aa01265b2bc8e46b6201b5f3b7c
-
SHA256
fa083a970c90e1e17f4aa83ccd7f0bf52b5e0f35eaf4eeda73abdc115d9b55b9
-
SHA512
b8ad5c57586b70a769d1f9562148de63a3c5835d6a35d3302f33d4d20619254ae5ae6a1703fb26aaa574d96ba15b053359fe0b17059577256a86ebeb53a9b5af
-
SSDEEP
24576:Fg/fK9XbMAWE9XEhG7q9efZyHS7en+gIlh:q4Mj4088HS7e+gIlh
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies security service
-
Quasar family
-
Quasar payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
5Disable or Modify Tools
4Indicator Removal
2File Deletion
2Modify Registry
8