General
-
Target
RNSM00274.7z
-
Size
7.2MB
-
Sample
241122-1qtlzawmgn
-
MD5
a110916d0a468ccda9c0b17572338215
-
SHA1
176443a15db6d58376f474183ff813c7420bb9b9
-
SHA256
1149ed9ea9f52479ac6b28f048afbea32353e7a5c28030a9b78a58d75a3e6609
-
SHA512
846a622fdc1db53dbb18243d094cfb2b4b0b82e7704d58a78a49586e80f989fea18ca439869ce894b2e177627dd6f9454aedf40e8d2c09ca5ef7addd5966ede1
-
SSDEEP
196608:wT3R+yaMNsXtYjkIkdltX0iKtxQ4UINKz6zZ+ur:w7YMNykkdltEfxX5NKM+4
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00274.7z
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
RNSM00274.7z
-
Size
7.2MB
-
MD5
a110916d0a468ccda9c0b17572338215
-
SHA1
176443a15db6d58376f474183ff813c7420bb9b9
-
SHA256
1149ed9ea9f52479ac6b28f048afbea32353e7a5c28030a9b78a58d75a3e6609
-
SHA512
846a622fdc1db53dbb18243d094cfb2b4b0b82e7704d58a78a49586e80f989fea18ca439869ce894b2e177627dd6f9454aedf40e8d2c09ca5ef7addd5966ede1
-
SSDEEP
196608:wT3R+yaMNsXtYjkIkdltX0iKtxQ4UINKz6zZ+ur:w7YMNykkdltEfxX5NKM+4
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (533) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification
-
Disables cmd.exe use via registry modification
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
7Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1