General
-
Target
4040f089b7bc92a4577c047635308e06a75bc399ddc48cde510da3f2e57f9d24
-
Size
38KB
-
Sample
241225-lqs8wa1qgv
-
MD5
630d2dc7669c63817bad157e478fb8c7
-
SHA1
960eab4d1af6fd87107f0915bbf02a54d586869c
-
SHA256
4040f089b7bc92a4577c047635308e06a75bc399ddc48cde510da3f2e57f9d24
-
SHA512
018ff60348bf17e4aae57db3dd8dda3827926bf5001cc49c016c9a0ae62fa2cad82565b450f9198cdd5b26fa8c59735da3f346a58459c228ea9103050e5b2da0
-
SSDEEP
768:qNRqnHnqefPI7nWkzIjRTn7a731o3dz/NAapr63uqMpUXN:qqHnqPnch2o3dz/NjddvCXN
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
1.exe
-
Size
55KB
-
MD5
c75d77ce6144a284bcec84022a5d1166
-
SHA1
72c38863c4367096388766250c70437e84883bde
-
SHA256
161c471b0aaaf0d7c1f0267ebb837e10fb8c5edfe09b0d00bf2472820f413713
-
SHA512
87c06f1b8f9dffbd51a54c70d0e0d4016e2e96c239f532d4a89d771bfec663aa2c171d4b3f36f726cddee38b8fafc23f3e1d20988c1e14e216daf1235ce360c4
-
SSDEEP
768:JvrNNeRBl5JFTXqwXrkgrn/9/HiDKGwRj4RcTdyH4pYT3nPKVU1E9AQo6nZsKHd5:zNeRBl5PT/rx1mzwRMSTdLpJ9oq
-
Phobos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (308) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1