General
-
Target
scarey.exe
-
Size
15.3MB
-
Sample
250328-v5wrzsyzc1
-
MD5
29805ee1be108e4c41b300c90f0c645c
-
SHA1
8d369ce4e631d79a92a0774ccc8ca1083fce84e5
-
SHA256
d924926446eff5ea2f185c29a92b2e1e62bdacd630dd33137e6e35df6fd4735e
-
SHA512
5dc878ea99be940cfe1bc057def3a61e0486b26905fb9660d50d76144a48a5adb239e8b21fc937670be0e49f2353257ba08f485bb6c969d74a2b50b84a055d99
-
SSDEEP
393216:HHW8Uwq3Obs2CltXMCHWUjZVg74w/ADF5ILf5kvsWP:nW8Uwq3ObRqtXMb8rDw/KLILf5kvLP
Behavioral task
behavioral1
Sample
scarey.exe
Resource
win11-20250313-en
Malware Config
Targets
-
-
Target
scarey.exe
-
Size
15.3MB
-
MD5
29805ee1be108e4c41b300c90f0c645c
-
SHA1
8d369ce4e631d79a92a0774ccc8ca1083fce84e5
-
SHA256
d924926446eff5ea2f185c29a92b2e1e62bdacd630dd33137e6e35df6fd4735e
-
SHA512
5dc878ea99be940cfe1bc057def3a61e0486b26905fb9660d50d76144a48a5adb239e8b21fc937670be0e49f2353257ba08f485bb6c969d74a2b50b84a055d99
-
SSDEEP
393216:HHW8Uwq3Obs2CltXMCHWUjZVg74w/ADF5ILf5kvsWP:nW8Uwq3ObRqtXMb8rDw/KLILf5kvLP
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (250) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1