General

  • Target

    OfficeSetup.exe

  • Size

    7.1MB

  • Sample

    230602-dnaprahf52

  • MD5

    5781f79d70dcea270950a0fc73e43beb

  • SHA1

    efb824956d620f49452fd6df0ada10992c302cdc

  • SHA256

    191a136632dc258553917026a7a46bf6d0945aab4feba00204ed012001a50507

  • SHA512

    67c5c7c160e8ad4195844b0c6be9a51b554fa01ed93ac719893a9a184672b224c6bed250a9220417e5b334d1cf5e3f1d024df3166b94762ccbff01c775da704b

  • SSDEEP

    196608:C49GfxidA1cQ379CfAaxRwhgiFcStLoKntczlkaI6HMaJTtGbbAgQ:C4QpidA1KfZRwhgRKntczB

Malware Config

Targets

    • Target

      OfficeSetup.exe

    • Size

      7.1MB

    • MD5

      5781f79d70dcea270950a0fc73e43beb

    • SHA1

      efb824956d620f49452fd6df0ada10992c302cdc

    • SHA256

      191a136632dc258553917026a7a46bf6d0945aab4feba00204ed012001a50507

    • SHA512

      67c5c7c160e8ad4195844b0c6be9a51b554fa01ed93ac719893a9a184672b224c6bed250a9220417e5b334d1cf5e3f1d024df3166b94762ccbff01c775da704b

    • SSDEEP

      196608:C49GfxidA1cQ379CfAaxRwhgiFcStLoKntczlkaI6HMaJTtGbbAgQ:C4QpidA1KfZRwhgRKntczB

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

3
T1060

Change Default File Association

1
T1042

Browser Extensions

1
T1176

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

5
T1112

Discovery

Query Registry

7
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Tasks