General
-
Target
http://reddit.com
-
Sample
241117-t6dgcstgrj
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://reddit.com
Resource
win10v2004-20241007-en
cryptolockerdefense_evasiondiscoveryevasionexecutionimpactpersistencephishingransomwarespywarestealer
windows10-2004-x64
34 signatures
150 seconds
Malware Config
Targets
-
-
Target
http://reddit.com
-
Cryptolocker family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: Robotowght@500
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1