General

  • Target

    7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442

  • Size

    2.2MB

  • Sample

    220426-16cy6aadbm

  • MD5

    40caa9b00badca24594571e157a6d2a9

  • SHA1

    42f2faf2aa59f38c16824eaa1dc022fddb142565

  • SHA256

    7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442

  • SHA512

    e8517ff311d81efe14707629f1730ca329db66b92d17ff711945ec5a0313de3cc914d59fd621bfcb907750b0947778784da191c0c6d703c92f788e61dc5e34d3

Malware Config

Targets

    • Target

      7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442

    • Size

      2.2MB

    • MD5

      40caa9b00badca24594571e157a6d2a9

    • SHA1

      42f2faf2aa59f38c16824eaa1dc022fddb142565

    • SHA256

      7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442

    • SHA512

      e8517ff311d81efe14707629f1730ca329db66b92d17ff711945ec5a0313de3cc914d59fd621bfcb907750b0947778784da191c0c6d703c92f788e61dc5e34d3

    • Modifies security service

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Impact

Service Stop

1
T1489

Tasks