General

  • Target

    e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca

  • Size

    127KB

  • Sample

    221124-wpk6zsea9s

  • MD5

    e8fffe1dbe96f88c523e11d838d44fd0

  • SHA1

    6fa324df92d16f17d4ee245e3d714ff2664e5a8e

  • SHA256

    e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca

  • SHA512

    4730e2300392daefbeaf73622ca43c63f8fe887d8c312c5cabd4ef91fe39daed0e291446176ab48935f437a0fd8e72b067fd571c8cea667c115b2f300228018d

  • SSDEEP

    3072:IPNYnkG4nKytT3BIjbwC25z5N1AxDjZqMNRsEd:nBAtIjb0z5nWJvB

Malware Config

Targets

    • Target

      e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca

    • Size

      127KB

    • MD5

      e8fffe1dbe96f88c523e11d838d44fd0

    • SHA1

      6fa324df92d16f17d4ee245e3d714ff2664e5a8e

    • SHA256

      e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca

    • SHA512

      4730e2300392daefbeaf73622ca43c63f8fe887d8c312c5cabd4ef91fe39daed0e291446176ab48935f437a0fd8e72b067fd571c8cea667c115b2f300228018d

    • SSDEEP

      3072:IPNYnkG4nKytT3BIjbwC25z5N1AxDjZqMNRsEd:nBAtIjb0z5nWJvB

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks