General

  • Target

    Presupuesto proyecto P3787-SHN Barcelona.pdf.exe

  • Size

    389KB

  • Sample

    220214-m3efxshbb8

  • MD5

    889ae401a3acc4f824065ac0f47143b5

  • SHA1

    6f81823927158edf53d6b08d2d38dab356cba70e

  • SHA256

    69186bb77f81edb9bcc66a0382fe00944e6dc67982d61d37d7f0d2e32e92d727

  • SHA512

    128988c0047380512caa0d6d9c68f7571f06388d6862549675caeb21ddbe04e0b648e78f0ea0e90d7c516b33c91d2abe851503dc55cb842b24da7196ab7b1915

Malware Config

Targets

    • Target

      Presupuesto proyecto P3787-SHN Barcelona.pdf.exe

    • Size

      389KB

    • MD5

      889ae401a3acc4f824065ac0f47143b5

    • SHA1

      6f81823927158edf53d6b08d2d38dab356cba70e

    • SHA256

      69186bb77f81edb9bcc66a0382fe00944e6dc67982d61d37d7f0d2e32e92d727

    • SHA512

      128988c0047380512caa0d6d9c68f7571f06388d6862549675caeb21ddbe04e0b648e78f0ea0e90d7c516b33c91d2abe851503dc55cb842b24da7196ab7b1915

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks