General

  • Target

    9085c7362c4d60e3e0d71ad4e7cbd6e1d1c7eeaa5ad50f4ae17b0a05bdf83e3d

  • Size

    133KB

  • Sample

    221125-jarc8sed9z

  • MD5

    79bc105d02ada09b4c6a46ca0f229530

  • SHA1

    8fee82b424adbf8dd7d3cd19208b5d84d9dd6a9e

  • SHA256

    9085c7362c4d60e3e0d71ad4e7cbd6e1d1c7eeaa5ad50f4ae17b0a05bdf83e3d

  • SHA512

    323156fd5a753e84bd8613d6b4bf288928c1539c7033b6af5e3596d6ee9c22ffdb2ad15743248aec3a92e99ec99017f0d347523660a931a92d0b39ca8671781f

  • SSDEEP

    3072:U7Wxpu0tXBB+LWuBYj/UJCHvVi5oNaUVLD2KIg:TuEIXgqCHXNJLD29

Malware Config

Targets

    • Target

      9085c7362c4d60e3e0d71ad4e7cbd6e1d1c7eeaa5ad50f4ae17b0a05bdf83e3d

    • Size

      133KB

    • MD5

      79bc105d02ada09b4c6a46ca0f229530

    • SHA1

      8fee82b424adbf8dd7d3cd19208b5d84d9dd6a9e

    • SHA256

      9085c7362c4d60e3e0d71ad4e7cbd6e1d1c7eeaa5ad50f4ae17b0a05bdf83e3d

    • SHA512

      323156fd5a753e84bd8613d6b4bf288928c1539c7033b6af5e3596d6ee9c22ffdb2ad15743248aec3a92e99ec99017f0d347523660a931a92d0b39ca8671781f

    • SSDEEP

      3072:U7Wxpu0tXBB+LWuBYj/UJCHvVi5oNaUVLD2KIg:TuEIXgqCHXNJLD29

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

3
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks