General

  • Target

    7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78

  • Size

    368KB

  • Sample

    221124-pa9sgaff8v

  • MD5

    891d6585190bc5d5a219562c998ae945

  • SHA1

    571981a09506df4c110a90041648f606d201776c

  • SHA256

    7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78

  • SHA512

    a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7

  • SSDEEP

    6144:hYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5q+cvrfA:K9BvctM85t35JPNJj2WzoRLQYRYzmYOd

Score
10/10

Malware Config

Targets

    • Target

      7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78

    • Size

      368KB

    • MD5

      891d6585190bc5d5a219562c998ae945

    • SHA1

      571981a09506df4c110a90041648f606d201776c

    • SHA256

      7fa3d45f89cdef975d22b382921c1762164f2f2476f8da887ecc898b8d843d78

    • SHA512

      a8ce3c3568f4b7bb684e2e4fa9157063a213a0cd8838b6a8d833f41628978e24bb7cc6e453312c61d9e61d023534b8a23c743a9139c744f06f9ea8bc9fa2dcf7

    • SSDEEP

      6144:hYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5q+cvrfA:K9BvctM85t35JPNJj2WzoRLQYRYzmYOd

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

2
T1004

Hidden Files and Directories

2
T1158

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

7
T1112

Hidden Files and Directories

2
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks