General
-
Target
SnuVy Spoof.exe
-
Size
746KB
-
Sample
241122-erzzgstqg1
-
MD5
65b0e91512cc8d241ecc81dcba75d018
-
SHA1
3552fd50d9db83ba21abc56c6cd986637c3df51f
-
SHA256
9d3219f467a2616a7e6844ecbb0df5c5dddf8536d444691bd2c18bb899092eb2
-
SHA512
5ef4fa0cb5645a2f6582e20f2e21b770737ae2938a8b609131ea6cefef269b938d5b2ca70713af8f071e5d3a04778e5b01a975f4b2e5f44090245c70aed9b017
-
SSDEEP
12288:qr8DUq79BdXaHsLXqltIRIyr50UaGIdlijbZVIE:qrYUOBp5XqltmP6UaGEkj3
Static task
static1
Behavioral task
behavioral1
Sample
SnuVy Spoof.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
SnuVy Spoof.exe
-
Size
746KB
-
MD5
65b0e91512cc8d241ecc81dcba75d018
-
SHA1
3552fd50d9db83ba21abc56c6cd986637c3df51f
-
SHA256
9d3219f467a2616a7e6844ecbb0df5c5dddf8536d444691bd2c18bb899092eb2
-
SHA512
5ef4fa0cb5645a2f6582e20f2e21b770737ae2938a8b609131ea6cefef269b938d5b2ca70713af8f071e5d3a04778e5b01a975f4b2e5f44090245c70aed9b017
-
SSDEEP
12288:qr8DUq79BdXaHsLXqltIRIyr50UaGIdlijbZVIE:qrYUOBp5XqltmP6UaGEkj3
-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1