General

  • Target

    DriverEasy_Setup.exe

  • Size

    5.0MB

  • Sample

    210209-pnhrvrw1ex

  • MD5

    7c6c801ec4fc74865194c42230f391ab

  • SHA1

    50b1166d786e209414f5e2b051d023792405883a

  • SHA256

    10cb7412824e0d603884f6a324d2067408749855f1043764946fcd9a5f725644

  • SHA512

    a5b71d8c80aae6cb3d5da73cc1dbbe6f3331025674da4064a1fb1ae0e82f31e1430bff9c435e55dacb2fb450fba522c9de2698c929cf81ec7b74aa2690d042b7

Malware Config

Targets

    • Target

      DriverEasy_Setup.exe

    • Size

      5.0MB

    • MD5

      7c6c801ec4fc74865194c42230f391ab

    • SHA1

      50b1166d786e209414f5e2b051d023792405883a

    • SHA256

      10cb7412824e0d603884f6a324d2067408749855f1043764946fcd9a5f725644

    • SHA512

      a5b71d8c80aae6cb3d5da73cc1dbbe6f3331025674da4064a1fb1ae0e82f31e1430bff9c435e55dacb2fb450fba522c9de2698c929cf81ec7b74aa2690d042b7

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Bootkit

1
T1067

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks