General

  • Target

    WiseVector_Setup.exe

  • Size

    33.4MB

  • Sample

    210719-5kbna77fj2

  • MD5

    dcc40be7f6bf04ef7c972ee1bc090a0c

  • SHA1

    8758e593589acfa8948e3d89706f9556458eb83b

  • SHA256

    1df31957b1f42c7043f2f38be08950039d54138ca12abb666126cd8bb5d71bb9

  • SHA512

    9c8cc36359e85d271493adae88ce79227359ca65b9996d476f2eb087f574de8b7f0b4b39533d659cfeed77e4b1a7b2480a296c7a51f78a2b45f3918f2fabbe58

Malware Config

Targets

    • Target

      WiseVector_Setup.exe

    • Size

      33.4MB

    • MD5

      dcc40be7f6bf04ef7c972ee1bc090a0c

    • SHA1

      8758e593589acfa8948e3d89706f9556458eb83b

    • SHA256

      1df31957b1f42c7043f2f38be08950039d54138ca12abb666126cd8bb5d71bb9

    • SHA512

      9c8cc36359e85d271493adae88ce79227359ca65b9996d476f2eb087f574de8b7f0b4b39533d659cfeed77e4b1a7b2480a296c7a51f78a2b45f3918f2fabbe58

    • Registers COM server for autorun

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks