General

  • Target

    971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd

  • Size

    13.2MB

  • Sample

    210509-6jj9ecwcza

  • MD5

    9632b1f804ec7e7e67f16d6395574ede

  • SHA1

    5b3747e53335523cdc2305f83a7fa803d969f72b

  • SHA256

    971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd

  • SHA512

    21cbd99c9b727824dc855a3198826c828300b2d36409b8ed0c9a52c2a11ea7b3fdcad37c4244f4e6957fd0d269f40566e218e982d4ea8fb4f88d03e3845c8ba0

Score
8/10

Malware Config

Targets

    • Target

      971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd

    • Size

      13.2MB

    • MD5

      9632b1f804ec7e7e67f16d6395574ede

    • SHA1

      5b3747e53335523cdc2305f83a7fa803d969f72b

    • SHA256

      971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd

    • SHA512

      21cbd99c9b727824dc855a3198826c828300b2d36409b8ed0c9a52c2a11ea7b3fdcad37c4244f4e6957fd0d269f40566e218e982d4ea8fb4f88d03e3845c8ba0

    Score
    8/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks