General
-
Target
final.exe
-
Size
30.0MB
-
Sample
250121-k55d1swlft
-
MD5
b99c03cd9b08cab0486408adda2ed578
-
SHA1
7cc84c2d0f9bd4141eff8791a5aea694022eaa56
-
SHA256
a65610a00b2d16c046d140cc4bd9e634e62b1de6367c496221b9631545b8736a
-
SHA512
5195d12028cff6543663c54426da9dcbfd1df89e4a2fc7f208d5a60817b325ca3189820bf9b2da39fafc1e2515e9b5e97881aeff94f809160bede5678eae3f7f
-
SSDEEP
786432:1VBx9Yidhz2W8A1YEA8o1QtIYa8DZcUTOl8fVGdO+TKPHmEakjN06tcDIx:1VBx9JaWfuskiIp61HF+TOHhakJ06tB
Behavioral task
behavioral1
Sample
final.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
final.exe
-
Size
30.0MB
-
MD5
b99c03cd9b08cab0486408adda2ed578
-
SHA1
7cc84c2d0f9bd4141eff8791a5aea694022eaa56
-
SHA256
a65610a00b2d16c046d140cc4bd9e634e62b1de6367c496221b9631545b8736a
-
SHA512
5195d12028cff6543663c54426da9dcbfd1df89e4a2fc7f208d5a60817b325ca3189820bf9b2da39fafc1e2515e9b5e97881aeff94f809160bede5678eae3f7f
-
SSDEEP
786432:1VBx9Yidhz2W8A1YEA8o1QtIYa8DZcUTOl8fVGdO+TKPHmEakjN06tcDIx:1VBx9JaWfuskiIp61HF+TOHhakJ06tB
-
Modifies Windows Defender Real-time Protection settings
-
UAC bypass
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Accessibility Features
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Accessibility Features
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
6Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1