General
-
Target
BUG32.zip
-
Size
2.5MB
-
Sample
250123-1x7r6sxkdq
-
MD5
4a17de99235b9d5cf6b65c165be746de
-
SHA1
bcf06ebc352c807cd4cac19976110c8bde8e08e8
-
SHA256
40b0c2cb712c0d0bdc5a98c93980e1270fdab8f354a7ab266b4c77a32a9aca95
-
SHA512
816570691ec0c1c22d564f0fb9a2964651323b608d60eefd79e37db03dd8844d68bba3ed91a0a6e9cbe0bf5789f593b060f61f31bf8131f2c5200f169371010d
-
SSDEEP
49152:zVxEPctOHZ17NeRgphrI0xU5pXdSipAI4XuiudK9rNH5MATt14KISn7YaYqm+G:zVZoBeRMrvxYXdSip/MHms4KNnMaYqy
Static task
static1
Behavioral task
behavioral1
Sample
BUG32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BUG32.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
BUG32.exe
-
Size
3.0MB
-
MD5
149cc2ec1900cb778afb50d8026eadf5
-
SHA1
a7bc1bbc7bdc970757ec369ef0b51dc53989f131
-
SHA256
817a695e53a1d6e24f2c701751b4d18468f20698f30fada420dfba6e21a09797
-
SHA512
d617654478beb6325d86c108cddaff8f8d658a235d26b8e0282ed85dca826bdb62b0b67e749c7cd421dbae1d98084220e2f4d5779badb8fd7ab07ff333a35553
-
SSDEEP
49152:Or2U5IahDUGN97rkqOAackLjQ0rZEAh3oA6wHE+K60Kk0aCLkfAZKt0OJTcL:4H2ahFNNrg3QbQoA6wHEnFN4IJu
-
Modifies WinLogon for persistence
-
UAC bypass
-
Renames multiple (159) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1