General

  • Target

    dessin.png

  • Size

    80KB

  • Sample

    240702-qxkyasyerp

  • MD5

    3c8ee9f208a665067b7c45c09364bd66

  • SHA1

    d520f752e9900f0665de10c3a52599903d86d7fd

  • SHA256

    34fd09da6124082ba6ccb2bef210c1afac9e0c6ba99a0e5c55062f338590ed67

  • SHA512

    ff110d3a463787f552640bc21f7ec5d1d930eb7997caa74b9bfee6e5b8d880362e79304eeac31a7dd384cc70f80efadb1b24e56075e784477c8f32a1c09aaac0

  • SSDEEP

    1536:l/286I6rdvOkwJ+g1hYZ2ewLXLbCQXTbvprTUV2wUE6PJ:lO86I6rHw8eYZ7wLXLbCQXTbvpHKEJ

Malware Config

Targets

    • Target

      dessin.png

    • Size

      80KB

    • MD5

      3c8ee9f208a665067b7c45c09364bd66

    • SHA1

      d520f752e9900f0665de10c3a52599903d86d7fd

    • SHA256

      34fd09da6124082ba6ccb2bef210c1afac9e0c6ba99a0e5c55062f338590ed67

    • SHA512

      ff110d3a463787f552640bc21f7ec5d1d930eb7997caa74b9bfee6e5b8d880362e79304eeac31a7dd384cc70f80efadb1b24e56075e784477c8f32a1c09aaac0

    • SSDEEP

      1536:l/286I6rdvOkwJ+g1hYZ2ewLXLbCQXTbvprTUV2wUE6PJ:lO86I6rHw8eYZ7wLXLbCQXTbvpHKEJ

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (517) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Windows Management Instrumentation

1
T1047

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Image File Execution Options Injection

1
T1546.012

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Image File Execution Options Injection

1
T1546.012

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

4
T1562

Disable or Modify Tools

2
T1562.001

Disable or Modify System Firewall

1
T1562.004

Safe Mode Boot

1
T1562.009

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Direct Volume Access

1
T1006

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

3
T1490

Tasks