General
-
Target
RNSM00291.7z
-
Size
16.4MB
-
Sample
241117-w7gxaawcmk
-
MD5
175a2ddac15fa0d6d65b9d7ff0a14bb3
-
SHA1
6aef3b2af90218f68b1908fc23341bfb47688b4f
-
SHA256
a6009358e5e3d3e091c66e8647af92f2c063720ec98b35246b60d35894ef1eda
-
SHA512
166a3c9d33f4fea2820d49db1a9a7adb34949610036f7e178bc369e2398cd5c4eaf8b7d39b3db5c41508268861c90a9410f20acd38abfcc5337d8306337eae34
-
SSDEEP
393216:x+xT7w8JKZ2d8b9Hwi1F7oHOBu4m9Z9lt3gCuLYI:A97w8MZuAlHhAOUNt3Hq
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00291.7z
Resource
win7-20241010-en
Malware Config
Extracted
gozi
Extracted
C:\Users\Public\Videos\how_to_back_files.html
class="mark">[email protected]</span>
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+vvnox.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/229B45C26DC9B9
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/229B45C26DC9B9
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/229B45C26DC9B9
http://xlowfznrg4wf7dli.ONION/229B45C26DC9B9
Extracted
C:\Users\Admin\Documents\save_your_files.html
Extracted
C:\Users\Public\Documents\_READ_THI$_FILE_95D5_.hta
cerber
Extracted
C:\Users\Public\Documents\_READ_THI$_FILE_HPGM_.txt
http://p27dokhpz2n7nvgr.onion/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1hpvzl.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1pglcs.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1cewld.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1js3tl.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1ajohk.top/F26E-3268-3C90-0446-9BDB
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\_RECOVERY_+jejhg.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/2C51B9E8D8684675
http://tes543berda73i48fsdfsd.keratadze.at/2C51B9E8D8684675
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2C51B9E8D8684675
http://xlowfznrg4wf7dli.ONION/2C51B9E8D8684675
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RECOVER+eihxu.TXT
http://akdfrefdkm45tf33fsdfsdf.yamenswash.com/2C51B9E8D8684675
http://p4fhmjnsdfbm4w4fdsc.avowvoice.com/2C51B9E8D8684675
http://nn54djhfnrnm4dnjnerfsd.replylaten.at/2C51B9E8D8684675
http://fwgrhsao3aoml7ej.onion/2C51B9E8D8684675
Extracted
C:\Users\Public\Recorded TV\Sample Media\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.asd3r3.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.azwsxe.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.adevf4.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.xtrvb4.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.werti4.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.onion/E99A-5580-A36F-0063-7AE4
Extracted
C:\Users\Public\Recorded TV\Sample Media\# DECRYPT MY FILES #.html
Targets
-
-
Target
RNSM00291.7z
-
Size
16.4MB
-
MD5
175a2ddac15fa0d6d65b9d7ff0a14bb3
-
SHA1
6aef3b2af90218f68b1908fc23341bfb47688b4f
-
SHA256
a6009358e5e3d3e091c66e8647af92f2c063720ec98b35246b60d35894ef1eda
-
SHA512
166a3c9d33f4fea2820d49db1a9a7adb34949610036f7e178bc369e2398cd5c4eaf8b7d39b3db5c41508268861c90a9410f20acd38abfcc5337d8306337eae34
-
SSDEEP
393216:x+xT7w8JKZ2d8b9Hwi1F7oHOBu4m9Z9lt3gCuLYI:A97w8MZuAlHhAOUNt3Hq
-
Cerber family
-
Gozi family
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Wannacry family
-
Contacts a large (25451) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (104) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
10Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1