General
-
Target
RNSM00363.7z
-
Size
10.7MB
-
Sample
241107-t4859aykfq
-
MD5
248bb72ffd8a4761046bfd48287f5956
-
SHA1
96dba0b79b1b19f5518655514ddd829524b42135
-
SHA256
832d0b83f8c89401a8caa59c7fccc510503cd2885c25c46099fe2a9ea0fef020
-
SHA512
3acb86d8877a68910f7539caac06a0a42aa8176e8071f6230a3e81eb53be281a6fee0b51e2c75ad6989d93ea1f74d2e909e87634d04689f80419661c478708e3
-
SSDEEP
196608:B98GogioOZWI3txM7a0L7dQKMyX7Mm8FPRmShvy2ZAw62r3DzV3dbvw1N:BNtOZWOtxM7Tp800Bp/p9tboN
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00363.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\$Recycle.Bin\JXIHUC-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/b613a6139ffd9da5
Targets
-
-
Target
RNSM00363.7z
-
Size
10.7MB
-
MD5
248bb72ffd8a4761046bfd48287f5956
-
SHA1
96dba0b79b1b19f5518655514ddd829524b42135
-
SHA256
832d0b83f8c89401a8caa59c7fccc510503cd2885c25c46099fe2a9ea0fef020
-
SHA512
3acb86d8877a68910f7539caac06a0a42aa8176e8071f6230a3e81eb53be281a6fee0b51e2c75ad6989d93ea1f74d2e909e87634d04689f80419661c478708e3
-
SSDEEP
196608:B98GogioOZWI3txM7a0L7dQKMyX7Mm8FPRmShvy2ZAw62r3DzV3dbvw1N:BNtOZWOtxM7Tp800Bp/p9tboN
-
Emotet family
-
Gandcrab family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (274) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1