General

  • Target

    DriverPack-17-Online_569590981.1586169787.exe

  • Size

    6.4MB

  • Sample

    220517-axy7xsfhek

  • MD5

    f9d8113ccfaa00f5fb6d1c8d88613d16

  • SHA1

    9cad0f98446f3cbe749084360b4e83104f93e9f8

  • SHA256

    d7eb9189ebf572a0b196fbb798ec038ce364a562c14d77ecc523451bee81ebba

  • SHA512

    d20969f552be9ff7455fe1cabc059f1818f9284c052aa0d9154384ada12ae3b01260ddbf3cec4274cf87c5bd50c594b5dce4fa915c4f5d38926414dae8efb8b9

Malware Config

Targets

    • Target

      DriverPack-17-Online_569590981.1586169787.exe

    • Size

      6.4MB

    • MD5

      f9d8113ccfaa00f5fb6d1c8d88613d16

    • SHA1

      9cad0f98446f3cbe749084360b4e83104f93e9f8

    • SHA256

      d7eb9189ebf572a0b196fbb798ec038ce364a562c14d77ecc523451bee81ebba

    • SHA512

      d20969f552be9ff7455fe1cabc059f1818f9284c052aa0d9154384ada12ae3b01260ddbf3cec4274cf87c5bd50c594b5dce4fa915c4f5d38926414dae8efb8b9

    • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016 (WinHTTPRequest)

      suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016 (WinHTTPRequest)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Detected potential entity reuse from brand google.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Security Software Discovery

1
T1063

Tasks