General
-
Target
RNSM00293.7z
-
Size
6.0MB
-
Sample
241117-v78vbsvfjk
-
MD5
7f2848772a398030c54e1c38f33e55b1
-
SHA1
f152362c1c62144106f62b26baaacde7b893d99a
-
SHA256
950e37343e3deb0b86b27ff5e0aac2690afe3fcf6cf1405d7660a9398b195222
-
SHA512
5bcaa1e9ae707203e42300a393339ca00b1c87af3e77d4b1d9a4174c7132500d50e15ea228093d5ecea878f6c540a4fab17fa4469e9f8c92226e0c100dea562c
-
SSDEEP
98304:Y1SMscnIGxA06I6+hk7UtlZhJMOCv0zqUSSPBLUOrovx70WrKKMixdclkKlOQd1:YjsPGxj6mlTJnhGyUOrAB0KMixdnad1
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00293.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+uky.txt
http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E
http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E
https://t7r67vsrpjcm5dfc.onion.to/2743F4EE3A36CA3E
https://t7r67vsrpjcm5dfc.tor2web.org/2743F4EE3A36CA3E
https://t7r67vsrpjcm5dfc.onion.cab/2743F4EE3A36CA3E
http://t7r67vsrpjcm5dfc.onion/2743F4EE3A36CA3E
Extracted
njrat
0.7d
HacKed
abdelkawii.zapto.org:5555
f497dfd998155558ed591c65cb1136d5
-
reg_key
f497dfd998155558ed591c65cb1136d5
-
splitter
|'|'|
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+wpvuf.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/FD8BDF412DD53D77
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/FD8BDF412DD53D77
http://5rport45vcdef345adfkksawe.bematvocal.at/FD8BDF412DD53D77
http://fwgrhsao3aoml7ej.onion/FD8BDF412DD53D77
http://fwgrhsao3aoml7ej.ONION/FD8BDF412DD53D77
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cvhwj.txt
http://t54ndnku456ngkwsudqer.wallymac.com/BBFFDAB5759CF8DF
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/BBFFDAB5759CF8DF
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/BBFFDAB5759CF8DF
http://xlowfznrg4wf7dli.onion/BBFFDAB5759CF8DF
http://xlowfznrg4wf7dli.ONION/BBFFDAB5759CF8DF
Extracted
C:\Users\Public\Videos\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.xo59ok.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.zx34jk.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.rt4e34.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.as13fd.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.onion/477C-90BF-775B-0291-25B3
Extracted
C:\Users\Public\Favorites\# DECRYPT MY FILES #.html
Targets
-
-
Target
RNSM00293.7z
-
Size
6.0MB
-
MD5
7f2848772a398030c54e1c38f33e55b1
-
SHA1
f152362c1c62144106f62b26baaacde7b893d99a
-
SHA256
950e37343e3deb0b86b27ff5e0aac2690afe3fcf6cf1405d7660a9398b195222
-
SHA512
5bcaa1e9ae707203e42300a393339ca00b1c87af3e77d4b1d9a4174c7132500d50e15ea228093d5ecea878f6c540a4fab17fa4469e9f8c92226e0c100dea562c
-
SSDEEP
98304:Y1SMscnIGxA06I6+hk7UtlZhJMOCv0zqUSSPBLUOrovx70WrKKMixdclkKlOQd1:YjsPGxj6mlTJnhGyUOrAB0KMixdnad1
-
Cerber family
-
Gozi family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Njrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Troldesh family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Contacts a large (17698) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
ModiLoader Second Stage
-
Modifies boot configuration data using bcdedit
-
Renames multiple (406) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Looks for VMWare Tools registry key
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
File and Directory Discovery
1Network Service Discovery
2Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3