General

  • Target

    MicrosoftEdgeUpdate.exe

  • Size

    4.9MB

  • Sample

    230116-blt99sba5x

  • MD5

    8223e55c97c61478aa4230b2ca498a38

  • SHA1

    a42c6d401fbf798806c5fe85c47cc047c189e486

  • SHA256

    496b8bd286c915005f3c55317df916ec79ad773e7b88e7f52ae7019f2f071ba7

  • SHA512

    5a2f32412d677e22602e0155a70328d9836e06eb26f59b6872b902fd044a7fb1011e066696018ae3db018282169e47e00aea3a861643662746543ab5f4d2f93d

  • SSDEEP

    98304:NKB0rS8yY+gIpexlkt2GguS8qth97fOMFz7lFrL8XE:8BaQgGft2hqeh97fOmXlFk

Malware Config

Targets

    • Target

      MicrosoftEdgeUpdate.exe

    • Size

      4.9MB

    • MD5

      8223e55c97c61478aa4230b2ca498a38

    • SHA1

      a42c6d401fbf798806c5fe85c47cc047c189e486

    • SHA256

      496b8bd286c915005f3c55317df916ec79ad773e7b88e7f52ae7019f2f071ba7

    • SHA512

      5a2f32412d677e22602e0155a70328d9836e06eb26f59b6872b902fd044a7fb1011e066696018ae3db018282169e47e00aea3a861643662746543ab5f4d2f93d

    • SSDEEP

      98304:NKB0rS8yY+gIpexlkt2GguS8qth97fOMFz7lFrL8XE:8BaQgGft2hqeh97fOmXlFk

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks