General
-
Target
download.jpeg
-
Size
8KB
-
Sample
241209-wte6jawnb1
-
MD5
481a86abe01f14ad73d0d93e454ed545
-
SHA1
065757d42e841d3448ea2ed5faae9ee0bf9aed97
-
SHA256
ffd75540b52e4e5ad5725d58ce5af9d65e4984789aff76d82ad2fc5715df0357
-
SHA512
b39935b0a026fe5c500c7e575da1922f22cf8a439b22d74ff1a7187b3786c18a7ae5568f9f34af4279560fba5a741a3760613eb903f836d444b246c5d56ed4d5
-
SSDEEP
192:eWY1Lq5qF7bH2cGfx/XmqUZWJgrKj14Y25DXiX:eWY1FJrufBXvIKR14T5WX
Static task
static1
Behavioral task
behavioral1
Sample
download.jpg
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
download.jpeg
-
Size
8KB
-
MD5
481a86abe01f14ad73d0d93e454ed545
-
SHA1
065757d42e841d3448ea2ed5faae9ee0bf9aed97
-
SHA256
ffd75540b52e4e5ad5725d58ce5af9d65e4984789aff76d82ad2fc5715df0357
-
SHA512
b39935b0a026fe5c500c7e575da1922f22cf8a439b22d74ff1a7187b3786c18a7ae5568f9f34af4279560fba5a741a3760613eb903f836d444b246c5d56ed4d5
-
SSDEEP
192:eWY1Lq5qF7bH2cGfx/XmqUZWJgrKj14Y25DXiX:eWY1FJrufBXvIKR14T5WX
-
Mimikatz family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
mimikatz is an open source tool to dump credentials on Windows
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1