Resubmissions

25-08-2021 09:54

210825-79rzfjvlw2 10

25-08-2021 09:51

210825-tbz8595366 10

28-04-2021 22:50

210428-csmgr8bxe2 10

General

  • Target

    PO - CE AUSTRALIA PTY LTD.ppam.zip

  • Size

    9KB

  • Sample

    210825-79rzfjvlw2

  • MD5

    fe03dc39490fd2cdb1a42b3be4afaadc

  • SHA1

    44b233b7735bfc99551844ea886ec90d544f2520

  • SHA256

    0e9423c6b3d555a01513b11f32ab37696a240a469b496b64c01069c40e636447

  • SHA512

    11f2029261380b855c4198b57faf55a6b02880b34c4295183e3da0b7d1b7abf19a237afb09a167b1d882f881e959f67332d7c44e67f7cd4838c3fde359997c9a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://73cceb63-7ecd-45e2-9eab-f8d98aab177f.usrfiles.com/ugd/73cceb_4906e68401a54bdf99cdcca2ef189f9d.txt

Targets

    • Target

      PO - CE AUSTRALIA PTY LTD.ppam

    • Size

      10KB

    • MD5

      7c629522213c57c3b3d66ee8e6c13fed

    • SHA1

      352b55636c67a5cd27a998888df0a137ef5433d8

    • SHA256

      a2e98dd3fa146e70b06e95d0cbbf9a831a04e94572a229e6d554372cb6943c04

    • SHA512

      385fbe8c518741e20daf5a62ac6e772d9d7b813e53e2a02b75f32287711c5ca316e162d24b04f48c1a90d799314f330fdc564a3494a27fa3811c1eb87571563b

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks