General
-
Target
RNSM00272.7z
-
Size
5.2MB
-
Sample
241122-1vs61azpfs
-
MD5
eadcd360fb1a1daf696f61968aa8f432
-
SHA1
88af3355405ba550ee82b39041f5a81f63d74dda
-
SHA256
20b37ae125dc868f05fe28dad7206435d99baaf499f10ffa361bb071eeba1c02
-
SHA512
ae290cf8f0956f7693100f54154cf9b1291b18ea98ce6cd058c01b097e7d4ff3ffaaea85e40e3dcf7976145a05043e44644262a697f072351c38c311ab5d56b5
-
SSDEEP
98304:TFEVgOf8S8rW7u8o1Oc/Q7Ia23NbZZxkzG7dmzZQKV+bjii6Uj5VOW2WDvWvQjq9:TFuf8VrEu8oLGGkzS2QKVSjsUB2MOIO9
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00272.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\_README_KSKUYX_.hta
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kxssw.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3C7F6036C3BAB654
http://kkd47eh4hdjshb5t.angortra.at/3C7F6036C3BAB654
http://ytrest84y5i456hghadefdsd.pontogrot.com/3C7F6036C3BAB654
http://xlowfznrg4wf7dli.ONION/3C7F6036C3BAB654
Targets
-
-
Target
RNSM00272.7z
-
Size
5.2MB
-
MD5
eadcd360fb1a1daf696f61968aa8f432
-
SHA1
88af3355405ba550ee82b39041f5a81f63d74dda
-
SHA256
20b37ae125dc868f05fe28dad7206435d99baaf499f10ffa361bb071eeba1c02
-
SHA512
ae290cf8f0956f7693100f54154cf9b1291b18ea98ce6cd058c01b097e7d4ff3ffaaea85e40e3dcf7976145a05043e44644262a697f072351c38c311ab5d56b5
-
SSDEEP
98304:TFEVgOf8S8rW7u8o1Oc/Q7Ia23NbZZxkzG7dmzZQKV+bjii6Uj5VOW2WDvWvQjq9:TFuf8VrEu8oLGGkzS2QKVSjsUB2MOIO9
-
Cerber family
-
Locky family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
ModiLoader Second Stage
-
Renames multiple (387) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Contacts a large (755) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
File and Directory Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1Software Discovery
2Security Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3