General
-
Target
RNSM00300.7z
-
Size
14.0MB
-
Sample
241113-xw9zcs1lgk
-
MD5
86ca55c0e02afac41b98fb5bc9ceb5f8
-
SHA1
7eb1b3676dcee7b3270ee96f38641f212b3e63a9
-
SHA256
a1b6da5cf5ceff441aaf5b1b3e962d473b185d4b70e1abfefabe859d4bc1fe03
-
SHA512
b844650254638e4c58deb7740eb1febdae6062300bb704d79486f611766daa9c14f58df6769f553ccf3ce254c8d2ba9bfadfa84908d6951a316752df188b717b
-
SSDEEP
393216:u0lNP1E1B31eadiqPnfGDG4la4AvHDIubIaVSDoWyq5y:5DPKBFeeffC9a4o8uUYSoWyR
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00300.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\Users\Public\Videos\how_to_decrypt_files.html
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+hhthx.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/5E10E3F8F525605
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/5E10E3F8F525605
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/5E10E3F8F525605
http://xlowfznrg4wf7dli.ONION/5E10E3F8F525605
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nttno.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9F2A4996FD94963A
http://kkd47eh4hdjshb5t.angortra.at/9F2A4996FD94963A
http://ytrest84y5i456hghadefdsd.pontogrot.com/9F2A4996FD94963A
http://xlowfznrg4wf7dli.ONION/9F2A4996FD94963A
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\_README_1VZP_.hta
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\help_restore_files_vhfto.html
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\help_restore_files_vhfto.txt
https://zpr5huq4bgmutfnf.onion.to/1B1E68323C928D4F
http://zpr5huq4bgmutfnf.onion/1B1E68323C928D4F
http://kfor94jsnduf73masd.rdxhuikm8t1sxpdf7.com/1B1E68323C928D4F
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+oilvv.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/9F2A4996FD94963A
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/9F2A4996FD94963A
http://94375hfsjhbdfkj5wfg.aladadear.com/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.onion/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.ONION/9F2A4996FD94963A
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kyygd.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/9F2A4996FD94963A
http://b4youfred5485jgsa3453f.italazudda.com/9F2A4996FD94963A
http://5rport45vcdef345adfkksawe.bematvocal.at/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.onion/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.ONION/9F2A4996FD94963A
Extracted
C:\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+hhs.txt
http://alcov44uvcwkrend.softpay4562.com/CC2A6E753D3433EA
http://tsbfdsv.extr6mchf.com/CC2A6E753D3433EA
http://psbc532jm8c.hsh73cu37n1.net/CC2A6E753D3433EA
https://vf4xdqg4mp3hnw5g.onion.to/CC2A6E753D3433EA
http://vf4xdqg4mp3hnw5g.onion/CC2A6E753D3433EA
Targets
-
-
Target
RNSM00300.7z
-
Size
14.0MB
-
MD5
86ca55c0e02afac41b98fb5bc9ceb5f8
-
SHA1
7eb1b3676dcee7b3270ee96f38641f212b3e63a9
-
SHA256
a1b6da5cf5ceff441aaf5b1b3e962d473b185d4b70e1abfefabe859d4bc1fe03
-
SHA512
b844650254638e4c58deb7740eb1febdae6062300bb704d79486f611766daa9c14f58df6769f553ccf3ce254c8d2ba9bfadfa84908d6951a316752df188b717b
-
SSDEEP
393216:u0lNP1E1B31eadiqPnfGDG4la4AvHDIubIaVSDoWyq5y:5DPKBFeeffC9a4o8uUYSoWyR
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Gozi family
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Locky family
-
Locky_lukitus family
-
Mimikatz family
-
Modifies WinLogon for persistence
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Contacts a large (16205) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry
-
Modifies boot configuration data using bcdedit
-
Renames multiple (1245) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
1Query Registry
4System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2