General

  • Target

    3c08d34d1872f701d5e497b62acb6a54feb5d67028c788e9315f0d47b898c448

  • Size

    1.1MB

  • Sample

    220703-kryz3scegp

  • MD5

    700d5f491c4a2a65fdfdf9ff0cffd711

  • SHA1

    7cbd8ec5351127aad93b1e7dd3ff553c640fed02

  • SHA256

    3c08d34d1872f701d5e497b62acb6a54feb5d67028c788e9315f0d47b898c448

  • SHA512

    db6eb14569740b70148400eaa6b36036b62e7c30e073b48bbdd0c61ca993073f3341058624ffee12f417f9764d3a7bced02c487d0e6ade4224bb702192d6bb3e

Score
10/10

Malware Config

Targets

    • Target

      3c08d34d1872f701d5e497b62acb6a54feb5d67028c788e9315f0d47b898c448

    • Size

      1.1MB

    • MD5

      700d5f491c4a2a65fdfdf9ff0cffd711

    • SHA1

      7cbd8ec5351127aad93b1e7dd3ff553c640fed02

    • SHA256

      3c08d34d1872f701d5e497b62acb6a54feb5d67028c788e9315f0d47b898c448

    • SHA512

      db6eb14569740b70148400eaa6b36036b62e7c30e073b48bbdd0c61ca993073f3341058624ffee12f417f9764d3a7bced02c487d0e6ade4224bb702192d6bb3e

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks