General
-
Target
RNSM00288.7z
-
Size
13.4MB
-
Sample
241119-wa3gqatngk
-
MD5
f44bed2280092b2ab1600098b32f2d4b
-
SHA1
b747e8ef1a04fcbcce623299edbaebc5308327bf
-
SHA256
e64e0e78a07088d7870dd8d4c021be360566cd35f8838e19cfd9efbc8799f17d
-
SHA512
3b51e37a90f345f58a0d272a872dada71eb5b827149a001cf46979e7018036f69ed5baec268bd75d9a18de6e8328c6058200d55537286b1f0a3e3623eb4d99a2
-
SSDEEP
393216:30dEla/6oM6wQcgz5bLXUv6KB3Wn4EUmRtqGKTF6ahmx8wOYt:oEA/cQPhbUv6KJyfqhhmjOS
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00288.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\ReadDecryptFilesHere.txt
Extracted
C:\Users\Admin\Pictures\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kuuko.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/32D525B2367AD7EE
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/32D525B2367AD7EE
http://5rport45vcdef345adfkksawe.bematvocal.at/32D525B2367AD7EE
http://xlowfznrg4wf7dli.onion/32D525B2367AD7EE
http://xlowfznrg4wf7dli.ONION/32D525B2367AD7EE
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+lpoqi.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/CE759B2D4C998DF
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/CE759B2D4C998DF
http://yyre45dbvn2nhbefbmh.begumvelic.at/CE759B2D4C998DF
http://xlowfznrg4wf7dli.ONION/CE759B2D4C998DF
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qiweg.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/32D525B2367AD7EE
http://b4youfred5485jgsa3453f.italazudda.com/32D525B2367AD7EE
http://5rport45vcdef345adfkksawe.bematvocal.at/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.onion/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.ONION/32D525B2367AD7EE
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pqnjv.txt
http://t54ndnku456ngkwsudqer.wallymac.com/565D3C565EFC27E
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/565D3C565EFC27E
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/565D3C565EFC27E
http://k7tlx3ghr3m4n2tu.onion/565D3C565EFC27E
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+armja.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/32D525B2367AD7EE
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/32D525B2367AD7EE
http://94375hfsjhbdfkj5wfg.aladadear.com/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.onion/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.ONION/32D525B2367AD7EE
Targets
-
-
Target
RNSM00288.7z
-
Size
13.4MB
-
MD5
f44bed2280092b2ab1600098b32f2d4b
-
SHA1
b747e8ef1a04fcbcce623299edbaebc5308327bf
-
SHA256
e64e0e78a07088d7870dd8d4c021be360566cd35f8838e19cfd9efbc8799f17d
-
SHA512
3b51e37a90f345f58a0d272a872dada71eb5b827149a001cf46979e7018036f69ed5baec268bd75d9a18de6e8328c6058200d55537286b1f0a3e3623eb4d99a2
-
SSDEEP
393216:30dEla/6oM6wQcgz5bLXUv6KB3Wn4EUmRtqGKTF6ahmx8wOYt:oEA/cQPhbUv6KJyfqhhmjOS
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Luminosity family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Contacts a large (8953) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
ModiLoader Second Stage
-
Renames multiple (131) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Looks for VMWare Tools registry key
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
2Indicator Removal
3File Deletion
3Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
File and Directory Discovery
1Network Service Discovery
2Peripheral Device Discovery
2Query Registry
6Software Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1Virtualization/Sandbox Evasion
3