General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17232.9077.2919

  • Size

    33KB

  • Sample

    220816-jlfe4shab9

  • MD5

    78a8eef1db5dba3faff2bead626f205a

  • SHA1

    dea2b77ef05fa0374377f71fb46a226a47124b2c

  • SHA256

    3598a4f8d24a8fbf222fff1b413c7b8409a0f7e099a37c0b1476c6928e76e688

  • SHA512

    aef9e5d9502278c19b82b5f3e57bb57833d7d54c2d1631935df4c509ce2753fb2646a2b82c4eccd9a3d198026011dee3a759ce350fa98facf58142ac0cfafd68

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17232.9077.2919

    • Size

      33KB

    • MD5

      78a8eef1db5dba3faff2bead626f205a

    • SHA1

      dea2b77ef05fa0374377f71fb46a226a47124b2c

    • SHA256

      3598a4f8d24a8fbf222fff1b413c7b8409a0f7e099a37c0b1476c6928e76e688

    • SHA512

      aef9e5d9502278c19b82b5f3e57bb57833d7d54c2d1631935df4c509ce2753fb2646a2b82c4eccd9a3d198026011dee3a759ce350fa98facf58142ac0cfafd68

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks