General
-
Target
main.exe
-
Size
39.3MB
-
Sample
241227-z13ryszmds
-
MD5
e3c53e4f05fc456e1cad2fbd4fa14873
-
SHA1
c8f5381de7e4af2efb7511346425f68166033f04
-
SHA256
0bb58e091494ae84d52df4041b1fe2f01e18b5a1dcabef1c6362abf37a95836f
-
SHA512
9c4e92336458e88dce984b31838db7780bb427426d6a6a500bc5b7f7c6517449ba99bd5f04bae4a095ffbd256016726df45665610cca94075f2d5ff9b7433ac9
-
SSDEEP
786432:l9YidhvMkqW8rK1QtICrhHJ5da8DZcUThl8Esx6fg0dQfUsoIhjCQerR6vp:l9JbqW9iICrhDI61AJ4g0GUlIY6v
Behavioral task
behavioral1
Sample
main.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
39.3MB
-
MD5
e3c53e4f05fc456e1cad2fbd4fa14873
-
SHA1
c8f5381de7e4af2efb7511346425f68166033f04
-
SHA256
0bb58e091494ae84d52df4041b1fe2f01e18b5a1dcabef1c6362abf37a95836f
-
SHA512
9c4e92336458e88dce984b31838db7780bb427426d6a6a500bc5b7f7c6517449ba99bd5f04bae4a095ffbd256016726df45665610cca94075f2d5ff9b7433ac9
-
SSDEEP
786432:l9YidhvMkqW8rK1QtICrhHJ5da8DZcUThl8Esx6fg0dQfUsoIhjCQerR6vp:l9JbqW9iICrhDI61AJ4g0GUlIY6v
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1