General

  • Target

    087407f4b497df85d74e01f61a4ba180ee83976eabb0d8b24a3ddbabfb22a8fd

  • Size

    1.1MB

  • Sample

    221126-25qpasca87

  • MD5

    e00e791b11a45b14e9697634ec448b59

  • SHA1

    d09ce3a226c5a75113768979f8b0d707886a9a7d

  • SHA256

    087407f4b497df85d74e01f61a4ba180ee83976eabb0d8b24a3ddbabfb22a8fd

  • SHA512

    f125c379bcd896b7b9f37ac84ff30d5e33159aadd1c0f9ee5f467ef20fcb6c7fb3e4f409bac3cf9e23eee76ad3a902dfcf3d566dcfd1c7fb0bf844091a262257

  • SSDEEP

    24576:pbCj2sObHtqQ4QETwiOVUYn6+GU/zjCHlifv6k:pbCjPKNqQ8wiA9F7Lak

Malware Config

Targets

    • Target

      087407f4b497df85d74e01f61a4ba180ee83976eabb0d8b24a3ddbabfb22a8fd

    • Size

      1.1MB

    • MD5

      e00e791b11a45b14e9697634ec448b59

    • SHA1

      d09ce3a226c5a75113768979f8b0d707886a9a7d

    • SHA256

      087407f4b497df85d74e01f61a4ba180ee83976eabb0d8b24a3ddbabfb22a8fd

    • SHA512

      f125c379bcd896b7b9f37ac84ff30d5e33159aadd1c0f9ee5f467ef20fcb6c7fb3e4f409bac3cf9e23eee76ad3a902dfcf3d566dcfd1c7fb0bf844091a262257

    • SSDEEP

      24576:pbCj2sObHtqQ4QETwiOVUYn6+GU/zjCHlifv6k:pbCjPKNqQ8wiA9F7Lak

    • Modifies WinLogon for persistence

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks