General

  • Target

    96442eb485c39eb8651526f48308d799

  • Size

    3.7MB

  • Sample

    201117-6e3rctn1ax

  • MD5

    0caf2ac1d9bf654b65725e2ad30dba7f

  • SHA1

    a7c142daa8cdd524df29783d137a57013c794b7d

  • SHA256

    e56e8b12e3f84bdc0ddef9324321ad0bb2f1279a8e3d453a6ab2d83440a48249

  • SHA512

    56a39b020c34aa3bf97342b01a01b1cde47482c2504536c1ce5abf09377b9b3e7129ce0f94db8e968a50746ae4ff91acd1e22bfe4c13775f9908e60dce600547

Malware Config

Targets

    • Target

      96442eb485c39eb8651526f48308d799

    • Size

      3.7MB

    • MD5

      0caf2ac1d9bf654b65725e2ad30dba7f

    • SHA1

      a7c142daa8cdd524df29783d137a57013c794b7d

    • SHA256

      e56e8b12e3f84bdc0ddef9324321ad0bb2f1279a8e3d453a6ab2d83440a48249

    • SHA512

      56a39b020c34aa3bf97342b01a01b1cde47482c2504536c1ce5abf09377b9b3e7129ce0f94db8e968a50746ae4ff91acd1e22bfe4c13775f9908e60dce600547

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

5
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Tasks