General

  • Target

    9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf

  • Size

    722KB

  • Sample

    221201-hys2asaa5x

  • MD5

    a7653be2c395c8919b16050ca4d2a735

  • SHA1

    9599c03484f016971982ac4366c829a710bd8aa5

  • SHA256

    9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf

  • SHA512

    0293a2a1cbf46d6b991da259d7e2cbc130577d0f3a36f1be4389fbbb3c80597f38d713ad285b96a469d9836fb3a1df0b8a2eb7a911be6da767b3fd7fa35ca78a

  • SSDEEP

    6144:Mc5DI5J2b4YX0ayv8a7JRpyG9AN2UeQY0yzcPSHpLUYQdeNgVmn/l4EI8XuGJHmj:x+mxDyv8GAoUegic8pLUYQANZ//eOGr

Malware Config

Targets

    • Target

      9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf

    • Size

      722KB

    • MD5

      a7653be2c395c8919b16050ca4d2a735

    • SHA1

      9599c03484f016971982ac4366c829a710bd8aa5

    • SHA256

      9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf

    • SHA512

      0293a2a1cbf46d6b991da259d7e2cbc130577d0f3a36f1be4389fbbb3c80597f38d713ad285b96a469d9836fb3a1df0b8a2eb7a911be6da767b3fd7fa35ca78a

    • SSDEEP

      6144:Mc5DI5J2b4YX0ayv8a7JRpyG9AN2UeQY0yzcPSHpLUYQdeNgVmn/l4EI8XuGJHmj:x+mxDyv8GAoUegic8pLUYQANZ//eOGr

    • Modifies firewall policy service

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks