General
-
Target
RNSM00354.7z
-
Size
6.8MB
-
Sample
241109-ybr4gstldj
-
MD5
00d2c7493d9c514fe2a9c0d8b87d1484
-
SHA1
f6b63772a282555c675fca567f6af3a83f2d4df6
-
SHA256
2d0d54a8f9c47e533b57d6ef8abe888a55d9640864bf1177be681681fd5b7201
-
SHA512
45aa77f6e9ab24711d3445c97729174d0f364f79a505a4f5d5aed7153a39c1d36504acc7fd9228e284572440b6768dd3280ddbd26864568ede316a0e0554c4a0
-
SSDEEP
196608:euIhlBI9Bcp/mHqCMUcQnBkLie+ca5Xs621X0BrWMmP10J0wiJ9PdQbp:tIHG9BcuqRUciB6dV621oDm10JJIVQl
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00354.7z
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
MEGworld.,
Extracted
C:\$Recycle.Bin\SGTSNWVI-DECRYPT.txt
http://gandcrabmfe6mnef.onion/eac637f08eba8546
Extracted
njrat
0.7d
HacKed
mrz.myvnc.com:1177
f7d73a561f889dd49782785d2334f155
-
reg_key
f7d73a561f889dd49782785d2334f155
-
splitter
|'|'|
Targets
-
-
Target
RNSM00354.7z
-
Size
6.8MB
-
MD5
00d2c7493d9c514fe2a9c0d8b87d1484
-
SHA1
f6b63772a282555c675fca567f6af3a83f2d4df6
-
SHA256
2d0d54a8f9c47e533b57d6ef8abe888a55d9640864bf1177be681681fd5b7201
-
SHA512
45aa77f6e9ab24711d3445c97729174d0f364f79a505a4f5d5aed7153a39c1d36504acc7fd9228e284572440b6768dd3280ddbd26864568ede316a0e0554c4a0
-
SSDEEP
196608:euIhlBI9Bcp/mHqCMUcQnBkLie+ca5Xs621X0BrWMmP10J0wiJ9PdQbp:tIHG9BcuqRUciB6dV621oDm10JJIVQl
-
Formbook family
-
Gandcrab family
-
Hawkeye family
-
Modifies WinLogon for persistence
-
Njrat family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (271) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
9Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Peripheral Device Discovery
2Query Registry
8Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2