General
-
Target
RNSM00285.7z
-
Size
4.4MB
-
Sample
241119-wr4q4szapb
-
MD5
0f3a44d5d6269a72d18e62de45e77381
-
SHA1
fc3681d29d62e37d26ff13697c764bf1612bb65b
-
SHA256
86c5188059a4fc949c9698c43e1a59229e0784c97fe70b46f3b49b2e96c107b0
-
SHA512
16e60bd278822ce6b78d711b96fe26c73b5920433eaa8b476685f2f24e803640fbdb2749b3cad887cce33a4e5fe00db938f8690594d63683c5635f66e107823b
-
SSDEEP
98304:J3M9IfbLlCUZnMRwQfEjGq7Hx7+RyvWwQORS5:Jc9IfbL4CMREjGkzQd5
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00285.7z
Resource
win7-20240708-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+xvjfp.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/C880A8F6AE72BE9A
http://b4youfred5485jgsa3453f.italazudda.com/C880A8F6AE72BE9A
http://5rport45vcdef345adfkksawe.bematvocal.at/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.onion/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.ONION/C880A8F6AE72BE9A
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dlefp.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/C880A8F6AE72BE9A
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/C880A8F6AE72BE9A
http://94375hfsjhbdfkj5wfg.aladadear.com/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.onion/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.ONION/C880A8F6AE72BE9A
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+aspum.txt
http://t54ndnku456ngkwsudqer.wallymac.com/D3F9968D41E97A19
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/D3F9968D41E97A19
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/D3F9968D41E97A19
http://xlowfznrg4wf7dli.onion/D3F9968D41E97A19
Targets
-
-
Target
RNSM00285.7z
-
Size
4.4MB
-
MD5
0f3a44d5d6269a72d18e62de45e77381
-
SHA1
fc3681d29d62e37d26ff13697c764bf1612bb65b
-
SHA256
86c5188059a4fc949c9698c43e1a59229e0784c97fe70b46f3b49b2e96c107b0
-
SHA512
16e60bd278822ce6b78d711b96fe26c73b5920433eaa8b476685f2f24e803640fbdb2749b3cad887cce33a4e5fe00db938f8690594d63683c5635f66e107823b
-
SSDEEP
98304:J3M9IfbLlCUZnMRwQfEjGq7Hx7+RyvWwQORS5:Jc9IfbL4CMREjGkzQd5
-
Cerber family
-
Gozi family
-
Modifies firewall policy service
-
Modifies security service
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (333) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Contacts a large (676) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Sets service image path in registry
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
9Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1