General

  • Target

    微软锁屏画报_支持win10win11.exe

  • Size

    4.2MB

  • Sample

    220424-gxcr9aceej

  • MD5

    ee1da257caaeb67a5b72d2f959d564cf

  • SHA1

    81827ee5093db823ba9c1a1625af479dfad36659

  • SHA256

    ce2daeaf4fcc6cf3499d6f1ab9d13e4c1db008fd50d48dcd9dfa496a561a135e

  • SHA512

    f376405944062c1d9456a43cb229bc654113ee10323febe69a89ac75175a34012a40ef198ffed0f17d8ffe0e57f910a25ab45d88b45b12f6fd6791345efe2d16

Malware Config

Targets

    • Target

      微软锁屏画报_支持win10win11.exe

    • Size

      4.2MB

    • MD5

      ee1da257caaeb67a5b72d2f959d564cf

    • SHA1

      81827ee5093db823ba9c1a1625af479dfad36659

    • SHA256

      ce2daeaf4fcc6cf3499d6f1ab9d13e4c1db008fd50d48dcd9dfa496a561a135e

    • SHA512

      f376405944062c1d9456a43cb229bc654113ee10323febe69a89ac75175a34012a40ef198ffed0f17d8ffe0e57f910a25ab45d88b45b12f6fd6791345efe2d16

    • UAC bypass

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks