Resubmissions

17-01-2021 18:41

210117-6tswpdfc2n 6

15-01-2021 00:12

210115-sn86b9adwn 10

15-01-2021 00:10

210115-4ez2jwsxxe 1

General

  • Target

    https://www.poly.com/in/en/support/downloads-apps

  • Sample

    210115-sn86b9adwn

Malware Config

Targets

    • Target

      https://www.poly.com/in/en/support/downloads-apps

    • Registers COM server for autorun

    • Ursnif RM3

      A heavily modified version of Ursnif discovered in the wild.

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • JavaScript code in executable

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks