General

  • Target

    XD_Set-Up-13.0.exe

  • Size

    2.0MB

  • Sample

    221213-jvawzsec52

  • MD5

    a2e2598bccb5127f4cf8de9a96ee9256

  • SHA1

    41c8b38cdfd505d4bd9d4233f255be08178dc71c

  • SHA256

    66a652d2dda6c1e8054b3ce431ec28cf55131312f1f931511ffbc08cf8683e55

  • SHA512

    0bd1e8368725a6f149acb8805f4ea01353c5d25c83441a71d4e9064db9add96c4d5fcc8686ddd4ea257dce0da96c7a026d517305f028b74f46521e01c6d96af8

  • SSDEEP

    49152:C6lcJlgIp7A+1d1cIieeHmw7JASN90k/YUz:rcgIlX1cDRAiMK

Malware Config

Targets

    • Target

      XD_Set-Up-13.0.exe

    • Size

      2.0MB

    • MD5

      a2e2598bccb5127f4cf8de9a96ee9256

    • SHA1

      41c8b38cdfd505d4bd9d4233f255be08178dc71c

    • SHA256

      66a652d2dda6c1e8054b3ce431ec28cf55131312f1f931511ffbc08cf8683e55

    • SHA512

      0bd1e8368725a6f149acb8805f4ea01353c5d25c83441a71d4e9064db9add96c4d5fcc8686ddd4ea257dce0da96c7a026d517305f028b74f46521e01c6d96af8

    • SSDEEP

      49152:C6lcJlgIp7A+1d1cIieeHmw7JASN90k/YUz:rcgIlX1cDRAiMK

    • Detected adobe phishing page

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

5
T1112

File Permissions Modification

1
T1222

Install Root Certificate

1
T1130

Discovery

Query Registry

6
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

2
T1120

Tasks