General
-
Target
RNSM00292.7z
-
Size
5.4MB
-
Sample
241117-wmqnpavkey
-
MD5
8a83f8f4b158a2523ad52c6425c8935b
-
SHA1
994680ba0dfb3f6bc0bfc86bbd4de6873709c039
-
SHA256
f0edaec536b41abae2eae5fb2c351a69ea4a54cc9dc6f61901b3549da7e45e32
-
SHA512
92df71a3c67d292de5eda51ce33b567cadbda73adb1615c9231b494bebc25d85fab05b3c9a86595f7222dd46bbc1b119dd2a5cee464c2bc38160fdf8e1918b66
-
SSDEEP
98304:jW7HRUmHm9uEa3p2CAdsO2zJYlWxXnK49Rv+SeWS4Eav1pjE7p/:eR1F/VssO2Ntx649K2EEjE7p/
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00292.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+rihou.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/964CFB991126D7F6
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/964CFB991126D7F6
http://5rport45vcdef345adfkksawe.bematvocal.at/964CFB991126D7F6
http://xlowfznrg4wf7dli.onion/964CFB991126D7F6
http://xlowfznrg4wf7dli.ONION/964CFB991126D7F6
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cbvax.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F584B6F3B95E785D
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F584B6F3B95E785D
http://yyre45dbvn2nhbefbmh.begumvelic.at/F584B6F3B95E785D
http://xlowfznrg4wf7dli.ONION/F584B6F3B95E785D
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.xzcfr4.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.asxce4.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.45kgok.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.ad34ft.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.onion/32F6-1C0F-6CE1-0063-7EDD
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Targets
-
-
Target
RNSM00292.7z
-
Size
5.4MB
-
MD5
8a83f8f4b158a2523ad52c6425c8935b
-
SHA1
994680ba0dfb3f6bc0bfc86bbd4de6873709c039
-
SHA256
f0edaec536b41abae2eae5fb2c351a69ea4a54cc9dc6f61901b3549da7e45e32
-
SHA512
92df71a3c67d292de5eda51ce33b567cadbda73adb1615c9231b494bebc25d85fab05b3c9a86595f7222dd46bbc1b119dd2a5cee464c2bc38160fdf8e1918b66
-
SSDEEP
98304:jW7HRUmHm9uEa3p2CAdsO2zJYlWxXnK49Rv+SeWS4Eav1pjE7p/:eR1F/VssO2Ntx649K2EEjE7p/
-
Betabot family
-
Cerber family
-
Locky family
-
Modifies firewall policy service
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Contacts a large (17511) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Modifies boot configuration data using bcdedit
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Renames multiple (4066) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Looks for VMWare services registry key.
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
2Indicator Removal
4Clear Persistence
1File Deletion
3Modify Registry
9Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
5Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1