General

  • Target

    PO#202280894645&637.ppa

  • Size

    88KB

  • Sample

    220808-mjs5zahddp

  • MD5

    e66f47a0d1972d2bc0c63a66f0a7313f

  • SHA1

    0957f530dafc189bd8f225e766df0af824b0d490

  • SHA256

    d4a17c3071447cee6d6ad443c53ce575af8820533c7c1ede02793bdec211253f

  • SHA512

    d11312fe3bb0c750fa236487fb82cd6803c3e49921192afa9ea25bc640693aba7533afb95955ecfbed0898f4c16dd3fc299bfe9f143c58a87a57c576cffdec41

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://bitbucket.org/!api/2.0/snippets/warzonepro/xE74pL/23b09005fce4aa8ca639c8efece136273f358586/files/devis2

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://bitbucket.org/!api/2.0/snippets/warzonepro/dk7dXq/70e7a3f4486531f18772c32194d7844ae03b17ff/files/devis222.txt

Targets

    • Target

      PO#202280894645&637.ppa

    • Size

      88KB

    • MD5

      e66f47a0d1972d2bc0c63a66f0a7313f

    • SHA1

      0957f530dafc189bd8f225e766df0af824b0d490

    • SHA256

      d4a17c3071447cee6d6ad443c53ce575af8820533c7c1ede02793bdec211253f

    • SHA512

      d11312fe3bb0c750fa236487fb82cd6803c3e49921192afa9ea25bc640693aba7533afb95955ecfbed0898f4c16dd3fc299bfe9f143c58a87a57c576cffdec41

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Command and Control

Web Service

1
T1102

Tasks