General

  • Target

    596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2

  • Size

    1.7MB

  • Sample

    221124-gaqqlafb8s

  • MD5

    4067b8f337c4b4e2f859894e2d353a6e

  • SHA1

    bb5f53cdf274ebb0c38dd6fa6ec53c6731dfffde

  • SHA256

    596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2

  • SHA512

    5444291420309b8a65d14b6f434f92acee8c038b55898b2a0c5383b5b26a88d6e377c05e6079c7b74fb84bd237889cc56bd98c0ceb44698a38f974a875d458b6

  • SSDEEP

    49152:tTu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5T:ty0mVgSxa872av9

Malware Config

Targets

    • Target

      596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2

    • Size

      1.7MB

    • MD5

      4067b8f337c4b4e2f859894e2d353a6e

    • SHA1

      bb5f53cdf274ebb0c38dd6fa6ec53c6731dfffde

    • SHA256

      596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2

    • SHA512

      5444291420309b8a65d14b6f434f92acee8c038b55898b2a0c5383b5b26a88d6e377c05e6079c7b74fb84bd237889cc56bd98c0ceb44698a38f974a875d458b6

    • SSDEEP

      49152:tTu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5T:ty0mVgSxa872av9

    • Modifies WinLogon for persistence

    • Modifies security service

    • UAC bypass

    • Windows security bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

9
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Impair Defenses

1
T1562

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks