General

  • Target

    72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8

  • Size

    71KB

  • Sample

    221124-3vs74sgc77

  • MD5

    d6f1148158f46d5d845d0fd4b77ab44b

  • SHA1

    51eb682f1b0b186ac86329cf65e3c70cee195178

  • SHA256

    72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8

  • SHA512

    38f02436a46fbaa0970871c169051ea50dc9d3349cf025ecb6d2938ce83b61610d3d1aaf58c45d08468f9400c4dddb3587c8f103b08693596ff7b4acfccc9914

  • SSDEEP

    768:eme0+LDFxI0xlMBBXwZmdWlBUUoArbMwCdJooWYAT1rak8aIHUm+MlXKCbF9+ljK:+0sIyOkllfoAPN+eoouq8HwjK

Malware Config

Targets

    • Target

      72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8

    • Size

      71KB

    • MD5

      d6f1148158f46d5d845d0fd4b77ab44b

    • SHA1

      51eb682f1b0b186ac86329cf65e3c70cee195178

    • SHA256

      72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8

    • SHA512

      38f02436a46fbaa0970871c169051ea50dc9d3349cf025ecb6d2938ce83b61610d3d1aaf58c45d08468f9400c4dddb3587c8f103b08693596ff7b4acfccc9914

    • SSDEEP

      768:eme0+LDFxI0xlMBBXwZmdWlBUUoArbMwCdJooWYAT1rak8aIHUm+MlXKCbF9+ljK:+0sIyOkllfoAPN+eoouq8HwjK

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks