General

  • Target

    Driver_Booster_19_02_23_to_msi.msi

  • Size

    7.2MB

  • Sample

    230219-pe115afe43

  • MD5

    5ad74e66323ae26320cd9c051f266a4f

  • SHA1

    d7f999814e7c76466dba21619defc955d2660f20

  • SHA256

    552c789cf68b88af18cf75ace35963445e3f7625cb07ae6b3933ceef26032f18

  • SHA512

    019d370fe90818e1e5650496bbe3b187f0cb933e18b7644120ee25065974c108633bdab28db09bff879240d30de5a845572f4d1eb81ce92b469acc6ffa3f49a3

  • SSDEEP

    196608:fYSxCsde/fxOql6socvDWnwlIzAY7kRSb6PdnjR:pxCz3xOHcRiERj

Malware Config

Targets

    • Target

      Driver_Booster_19_02_23_to_msi.msi

    • Size

      7.2MB

    • MD5

      5ad74e66323ae26320cd9c051f266a4f

    • SHA1

      d7f999814e7c76466dba21619defc955d2660f20

    • SHA256

      552c789cf68b88af18cf75ace35963445e3f7625cb07ae6b3933ceef26032f18

    • SHA512

      019d370fe90818e1e5650496bbe3b187f0cb933e18b7644120ee25065974c108633bdab28db09bff879240d30de5a845572f4d1eb81ce92b469acc6ffa3f49a3

    • SSDEEP

      196608:fYSxCsde/fxOql6socvDWnwlIzAY7kRSb6PdnjR:pxCz3xOHcRiERj

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks