General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Worm/Fagot.a.exe

  • Sample

    230330-t4hy3aeh2y

Malware Config

Targets

    • Target

      https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Worm/Fagot.a.exe

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Modifies firewall policy service

    • Modifies security service

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Registers new Print Monitor

    • Sets file execution options in registry

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

5
T1060

Winlogon Helper DLL

2
T1004

Modify Existing Service

3
T1031

Change Default File Association

1
T1042

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

15
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks