General

  • Target

    ABMSetup.msi

  • Size

    31.1MB

  • Sample

    221003-c7z83scgc8

  • MD5

    e06a255f22709132de6b13352afdc408

  • SHA1

    68ec7e47fb8a9ff80369752ad93287497f375987

  • SHA256

    f15635262c3aebcbb7ad1ef2891986922f9220cc2e997b7dafcbe429606729ba

  • SHA512

    fbc43230e748f289d1afc9f15e2316d14e5b271bcc9bdd38ed413c0f83d78df896cddb27db39bbc070744645234beebcc78bab5691497502c795eb141110b0e7

  • SSDEEP

    786432:x6VPIJkhz80kcutyoaDeR9ZCtBg1m3p5YZnEV1JLcI:xuRzFkcutWi9UrPsncJ4I

Score
8/10

Malware Config

Targets

    • Target

      ABMSetup.msi

    • Size

      31.1MB

    • MD5

      e06a255f22709132de6b13352afdc408

    • SHA1

      68ec7e47fb8a9ff80369752ad93287497f375987

    • SHA256

      f15635262c3aebcbb7ad1ef2891986922f9220cc2e997b7dafcbe429606729ba

    • SHA512

      fbc43230e748f289d1afc9f15e2316d14e5b271bcc9bdd38ed413c0f83d78df896cddb27db39bbc070744645234beebcc78bab5691497502c795eb141110b0e7

    • SSDEEP

      786432:x6VPIJkhz80kcutyoaDeR9ZCtBg1m3p5YZnEV1JLcI:xuRzFkcutWi9UrPsncJ4I

    Score
    8/10
    • Blocklisted process makes network request

    • Creates new service(s)

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Registers COM server for autorun

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Registry Run Keys / Startup Folder

2
T1060

Modify Existing Service

1
T1031

Privilege Escalation

New Service

1
T1050

Defense Evasion

Impair Defenses

1
T1562

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Impact

Service Stop

1
T1489

Tasks