General

  • Target

    specialsurprise.exe

  • Size

    9.8MB

  • Sample

    230328-g5kstsbb4y

  • MD5

    b05fbd1bfd40e5632c36341d1f4cae47

  • SHA1

    383df2dfd995236db0c5abcf84d867f2117215e7

  • SHA256

    d090c4b65f8f3145301e612f6007996c2408a140fbfd09b608cee3d4a273ff26

  • SHA512

    a40b4c4738675cb15007aca628fbf3a3a920a37e8a20c986e58539c58a4f31e6160825446fabed862793034b7072c90d33d622de5e3b8ba1b043cc519e1467aa

  • SSDEEP

    196608:HB5HVbnvf/tlSZSKWdPcYpdo5V30UsnzKTFQCZ+nE2bZq3WFGuUa:DVrnVlitW0MowTnzwFv+ZqGFdl

Malware Config

Targets

    • Target

      specialsurprise.exe

    • Size

      9.8MB

    • MD5

      b05fbd1bfd40e5632c36341d1f4cae47

    • SHA1

      383df2dfd995236db0c5abcf84d867f2117215e7

    • SHA256

      d090c4b65f8f3145301e612f6007996c2408a140fbfd09b608cee3d4a273ff26

    • SHA512

      a40b4c4738675cb15007aca628fbf3a3a920a37e8a20c986e58539c58a4f31e6160825446fabed862793034b7072c90d33d622de5e3b8ba1b043cc519e1467aa

    • SSDEEP

      196608:HB5HVbnvf/tlSZSKWdPcYpdo5V30UsnzKTFQCZ+nE2bZq3WFGuUa:DVrnVlitW0MowTnzwFv+ZqGFdl

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Bootkit

1
T1067

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Defacement

1
T1491

Tasks