General

  • Target

    Driver_Booster_19_02_23_to_msi.msi

  • Size

    7.2MB

  • Sample

    230220-ntzaeaac5y

  • MD5

    5ad74e66323ae26320cd9c051f266a4f

  • SHA1

    d7f999814e7c76466dba21619defc955d2660f20

  • SHA256

    552c789cf68b88af18cf75ace35963445e3f7625cb07ae6b3933ceef26032f18

  • SHA512

    019d370fe90818e1e5650496bbe3b187f0cb933e18b7644120ee25065974c108633bdab28db09bff879240d30de5a845572f4d1eb81ce92b469acc6ffa3f49a3

  • SSDEEP

    196608:fYSxCsde/fxOql6socvDWnwlIzAY7kRSb6PdnjR:pxCz3xOHcRiERj

Malware Config

Targets

    • Target

      Driver_Booster_19_02_23_to_msi.msi

    • Size

      7.2MB

    • MD5

      5ad74e66323ae26320cd9c051f266a4f

    • SHA1

      d7f999814e7c76466dba21619defc955d2660f20

    • SHA256

      552c789cf68b88af18cf75ace35963445e3f7625cb07ae6b3933ceef26032f18

    • SHA512

      019d370fe90818e1e5650496bbe3b187f0cb933e18b7644120ee25065974c108633bdab28db09bff879240d30de5a845572f4d1eb81ce92b469acc6ffa3f49a3

    • SSDEEP

      196608:fYSxCsde/fxOql6socvDWnwlIzAY7kRSb6PdnjR:pxCz3xOHcRiERj

    • Modifies Windows Defender notification settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Disables use of System Restore points

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

File Deletion

2
T1107

Virtualization/Sandbox Evasion

1
T1497

Hidden Files and Directories

2
T1158

File Permissions Modification

1
T1222

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

7
T1082

Peripheral Device Discovery

2
T1120

Impact

Inhibit System Recovery

3
T1490

Tasks