Resubmissions

25-06-2021 19:57

210625-fegc29cpbn 10

20-06-2021 14:16

210620-nvtv6r37hn 10

General

  • Target

    pdf-xchange_viewer_XV-78H1.exe

  • Size

    2.3MB

  • Sample

    210620-nvtv6r37hn

  • MD5

    642fa01134fc21a4faa5595d45e3f554

  • SHA1

    53bc8673fcbb4c2e748684c2462d3f01483d8dfe

  • SHA256

    a1ac1de4af2199117a8218947092bd9e0e1c90f30b734dd35a92a18af6be36d6

  • SHA512

    c255c73abd76c9e453f8f7fe6971ca36d1a9b52494ce8c587a4210336f631967af7d048402455362121ec9d1f9fbada89c1a129bef7a592d65d4462de32bbda3

Malware Config

Targets

    • Target

      pdf-xchange_viewer_XV-78H1.exe

    • Size

      2.3MB

    • MD5

      642fa01134fc21a4faa5595d45e3f554

    • SHA1

      53bc8673fcbb4c2e748684c2462d3f01483d8dfe

    • SHA256

      a1ac1de4af2199117a8218947092bd9e0e1c90f30b734dd35a92a18af6be36d6

    • SHA512

      c255c73abd76c9e453f8f7fe6971ca36d1a9b52494ce8c587a4210336f631967af7d048402455362121ec9d1f9fbada89c1a129bef7a592d65d4462de32bbda3

    • Registers COM server for autorun

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

New Service

1
T1050

Browser Extensions

1
T1176

Bootkit

1
T1067

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

System Information Discovery

5
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks