General
-
Target
n4jy44.zip
-
Size
1.1MB
-
Sample
250119-tbclkstrfw
-
MD5
69970a8e87c5f74862fd8226a8caa0b1
-
SHA1
bb6749a19c04d07b84f7928a8acf37d18abe2882
-
SHA256
88d0612d150853b8e7f3d3e3bfbc5d96d0469df4b53b6e2afbb882e39324b3c6
-
SHA512
1532fc72cfb5b3bd6e0e274e5d6fe1f3226ded0415aa5baf7d1d6828094fe2dc0e4fb13449f1f2fee9ef0994222bea5d8d83074f8d3f58bd18a8a706f7395a5d
-
SSDEEP
24576:VpTcb0buDzgfSKWQKGPzhfdfy2Np9nSlBYJkH4ghPDgeA/M:VpjqDEfyGPzXy2Npcla8h5OM
Static task
static1
Behavioral task
behavioral1
Sample
Nezur_Internal.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
drive-mens.gl.at.ply.gg:20498
-
Install_directory
%AppData%
-
install_file
SystemUser.exe
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
Nezur_Internal.exe
-
Size
1.3MB
-
MD5
c8e3253dfa6d5a21b87950dd7eb2c652
-
SHA1
c0d8849408efd3b42e07b8f43ecb2979158c9c0f
-
SHA256
b8d5ab8adf0da37f5fcd09e09d3bab66458f4cd6fefc5760daa8c247fd55eb76
-
SHA512
efa4cc3ccaa797c9f9c64c4aa6f4f0aa995d3e36bfe0563b7ffce0978ff880bc4fa913c363fbf7792fe552753098e870642b35602cf8625938e9ff84a1d376d9
-
SSDEEP
24576:cUTaQIolipFeyKvY4JMdA9MpBO++aBIbH1CAB1v:caIowzeth9KIbHhBp
-
Detect Xworm Payload
-
Wannacry family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1