General
-
Target
RNSM00298.7z
-
Size
10.6MB
-
Sample
241116-274zpswdjc
-
MD5
50a7d6abb0f7d5aba30b7e779739a9e9
-
SHA1
b2f1005c34f0e01bc1bc2e90e5c06304cdd2cd44
-
SHA256
886e4e9bfd023378759fccaf66af2b1cd12394530386518eb828d0cc05bb7d86
-
SHA512
5966d7cf85c2a580f6d89af2600a1e5d664ad02850d90abef491d12bda8edaf5cca329090995942b259341fdba863f5fcfcf32f74ed4184afbb7d03b99fa8afb
-
SSDEEP
196608:NLaJSRe3no/eZ442cPJRFJGRgilUNxM4rhtHWi2m+8cTMJXZaVPO0+2V:NmIR4JbFJGRQvrjHWyXYVG2V
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00298.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+dxqdb.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/9BAB94816838B211
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/9BAB94816838B211
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9BAB94816838B211
http://xlowfznrg4wf7dli.ONION/9BAB94816838B211
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ceksj.txt
http://p57gest54celltraf743knjf.mottesapo.com/C4155CE0F8803A93
http://k4restportgonst34d23r.oftpony.at/C4155CE0F8803A93
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/C4155CE0F8803A93
http://fwgrhsao3aoml7ej.onion/C4155CE0F8803A93
http://fwgrhsao3aoml7ej.ONION/C4155CE0F8803A93
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cpvxr.txt
http://t54ndnku456ngkwsudqer.wallymac.com/9BAB94816838B211
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/9BAB94816838B211
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/9BAB94816838B211
http://xlowfznrg4wf7dli.onion/9BAB94816838B211
http://xlowfznrg4wf7dli.ONION/9BAB94816838B211
Extracted
C:\Users\Admin\Downloads\README.hta
Targets
-
-
Target
RNSM00298.7z
-
Size
10.6MB
-
MD5
50a7d6abb0f7d5aba30b7e779739a9e9
-
SHA1
b2f1005c34f0e01bc1bc2e90e5c06304cdd2cd44
-
SHA256
886e4e9bfd023378759fccaf66af2b1cd12394530386518eb828d0cc05bb7d86
-
SHA512
5966d7cf85c2a580f6d89af2600a1e5d664ad02850d90abef491d12bda8edaf5cca329090995942b259341fdba863f5fcfcf32f74ed4184afbb7d03b99fa8afb
-
SSDEEP
196608:NLaJSRe3no/eZ442cPJRFJGRgilUNxM4rhtHWi2m+8cTMJXZaVPO0+2V:NmIR4JbFJGRQvrjHWyXYVG2V
-
Cerber family
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Locky_lukitus family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
Renames multiple (462) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Contacts a large (1323) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
File and Directory Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3