General

  • Target

    3b6fb95f4c4e8f78da8c574abf5fb9045547a15864d0e70a6ed8e731f357b3c9

  • Size

    940KB

  • Sample

    220703-tyvexagehk

  • MD5

    1a29324cb04bfb173233cd55e5a9afc4

  • SHA1

    4883104bc47f16c9b078b711e32263640a2b637c

  • SHA256

    3b6fb95f4c4e8f78da8c574abf5fb9045547a15864d0e70a6ed8e731f357b3c9

  • SHA512

    cfbe35b37a4412069160ed904fdf154a921aebb92dbe445e2b3d29c9a592f0dbb4a28a8f3ed09cbddc6357e48d7f6d8543e1d48888929affc55bfa548206a698

Score
10/10

Malware Config

Targets

    • Target

      3b6fb95f4c4e8f78da8c574abf5fb9045547a15864d0e70a6ed8e731f357b3c9

    • Size

      940KB

    • MD5

      1a29324cb04bfb173233cd55e5a9afc4

    • SHA1

      4883104bc47f16c9b078b711e32263640a2b637c

    • SHA256

      3b6fb95f4c4e8f78da8c574abf5fb9045547a15864d0e70a6ed8e731f357b3c9

    • SHA512

      cfbe35b37a4412069160ed904fdf154a921aebb92dbe445e2b3d29c9a592f0dbb4a28a8f3ed09cbddc6357e48d7f6d8543e1d48888929affc55bfa548206a698

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks