General
-
Target
RNSM00280.7z
-
Size
4.7MB
-
Sample
241120-tmvxaszdpp
-
MD5
b48f8458bdb951ccda3b160b14b66f58
-
SHA1
06fa206e5f66f2690fb7752b34bf5201549ff509
-
SHA256
1ec18abdb330ff2eb70bf897b7363e5c68505f9fa3fbc151d21aff89736874fa
-
SHA512
7c103b393a5aeff71d41b5203faa4c6f83f89f39d1da97782c0a3b3cd40cb77d7ffce5cf8f88f2120e3c7194714398f0a5688ab3c21a68f314d036f65294127a
-
SSDEEP
98304:coRmKVszuiggNjp+D3RAfkb5N1JZubwTHZH/8NXpe7udFjts3c:lRnaz4qMREkb5N1JA8DlZ6dFjtP
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00280.7z
Resource
win7-20241023-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_htjqw.html
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_htjqw.txt
https://zpr5huq4bgmutfnf.onion.to/446AEB6A2AC36782
http://zpr5huq4bgmutfnf.onion/446AEB6A2AC36782
http://kosdfnure75.op1gifsd05mllk.com/446AEB6A2AC36782
Extracted
C:\Users\Admin\Desktop\_HELP_HELP_HELP_2Q4P_.hta
cerber
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cqfpn.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/26985A21B99E3A
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/26985A21B99E3A
http://yyre45dbvn2nhbefbmh.begumvelic.at/26985A21B99E3A
http://xlowfznrg4wf7dli.ONION/26985A21B99E3A
Targets
-
-
Target
RNSM00280.7z
-
Size
4.7MB
-
MD5
b48f8458bdb951ccda3b160b14b66f58
-
SHA1
06fa206e5f66f2690fb7752b34bf5201549ff509
-
SHA256
1ec18abdb330ff2eb70bf897b7363e5c68505f9fa3fbc151d21aff89736874fa
-
SHA512
7c103b393a5aeff71d41b5203faa4c6f83f89f39d1da97782c0a3b3cd40cb77d7ffce5cf8f88f2120e3c7194714398f0a5688ab3c21a68f314d036f65294127a
-
SSDEEP
98304:coRmKVszuiggNjp+D3RAfkb5N1JZubwTHZH/8NXpe7udFjts3c:lRnaz4qMREkb5N1JA8DlZ6dFjtP
-
Cerber family
-
Cybergate family
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Renames multiple (305) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Contacts a large (1127) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
7Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3