Resubmissions

01-04-2023 16:33

230401-t2seqabb77 6

01-04-2023 16:19

230401-tsjq8abb34 10

General

  • Target

    sample

  • Size

    13KB

  • Sample

    230401-tsjq8abb34

  • MD5

    0a1d0cb632a7f7cde057b8c11c1248a2

  • SHA1

    651caf0aa2637d0b56411f1679eb68f43a7b00b2

  • SHA256

    9ea61336dc345e8e68c562f94a385c3831a0fe621d242f24abfbe34d28e16c57

  • SHA512

    f911550898a737cd17c11e0056660ba83b4a577baaeba85c5fea5f5119cb0cd8226f6176b0afafe163a57223c60b5767aed10211f6fde22eeb42aaa0f535524a

  • SSDEEP

    384:rN+0ElzeVoOsKlElKeGM0U8HhhbNAq28rtGk:rc0ElCVoOsKCI1MeBhb60rr

Malware Config

Targets

    • Target

      sample

    • Size

      13KB

    • MD5

      0a1d0cb632a7f7cde057b8c11c1248a2

    • SHA1

      651caf0aa2637d0b56411f1679eb68f43a7b00b2

    • SHA256

      9ea61336dc345e8e68c562f94a385c3831a0fe621d242f24abfbe34d28e16c57

    • SHA512

      f911550898a737cd17c11e0056660ba83b4a577baaeba85c5fea5f5119cb0cd8226f6176b0afafe163a57223c60b5767aed10211f6fde22eeb42aaa0f535524a

    • SSDEEP

      384:rN+0ElzeVoOsKlElKeGM0U8HhhbNAq28rtGk:rc0ElCVoOsKCI1MeBhb60rr

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand microsoft.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

3
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

5
T1082

Impact

Defacement

1
T1491

Tasks