General

  • Target

    microsoft_access_pat1X-1.exe

  • Size

    2.3MB

  • Sample

    220127-kq2pksadd6

  • MD5

    70a436205cfafb875676b19118ebaf05

  • SHA1

    4ce08afd240de07a5bd85a851e9ce52101922269

  • SHA256

    52b87817d75639ae61cd72574dc4e3227822bab454814671b62378d9e63e9332

  • SHA512

    6bdfd819d049a614af58414dbb2813ed712d515a4ffd751e9d8c4c52cba963897d1a121f834ae6cf9591c46dc502ef35752f3347fa0fd8c92fc7df47ecda418f

Malware Config

Targets

    • Target

      microsoft_access_pat1X-1.exe

    • Size

      2.3MB

    • MD5

      70a436205cfafb875676b19118ebaf05

    • SHA1

      4ce08afd240de07a5bd85a851e9ce52101922269

    • SHA256

      52b87817d75639ae61cd72574dc4e3227822bab454814671b62378d9e63e9332

    • SHA512

      6bdfd819d049a614af58414dbb2813ed712d515a4ffd751e9d8c4c52cba963897d1a121f834ae6cf9591c46dc502ef35752f3347fa0fd8c92fc7df47ecda418f

    • Registers COM server for autorun

    • Creates new service(s)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Detected potential entity reuse from brand microsoft.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

New Service

1
T1050

Browser Extensions

1
T1176

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks