General

  • Target

    Setup x64.exe

  • Size

    8.0MB

  • Sample

    230727-cprtzshb28

  • MD5

    764e375aa9397578843d6bc3fd4b36fd

  • SHA1

    93fba67749878860d3ed78ce13f4c6f3e0daa373

  • SHA256

    292191d75b42f5052fe0a5c4a2767d027d74fd174e0ca8c1ae46c58e7076fb6b

  • SHA512

    e6bba8e3113478bb98c8ff99e2a68688bf0754efea04b6e358de973b341e9e68498f79195aa63ce435db9ddee2fd79ada5b9a943b85d0a1aead3b157325fc64a

  • SSDEEP

    98304:Q0oUcJEe9biTp9dPLASQlFVv0pXP/e+47PwY2h7:Q0cJEebgp9BLjYbaXPqPW7

Malware Config

Targets

    • Target

      Setup x64.exe

    • Size

      8.0MB

    • MD5

      764e375aa9397578843d6bc3fd4b36fd

    • SHA1

      93fba67749878860d3ed78ce13f4c6f3e0daa373

    • SHA256

      292191d75b42f5052fe0a5c4a2767d027d74fd174e0ca8c1ae46c58e7076fb6b

    • SHA512

      e6bba8e3113478bb98c8ff99e2a68688bf0754efea04b6e358de973b341e9e68498f79195aa63ce435db9ddee2fd79ada5b9a943b85d0a1aead3b157325fc64a

    • SSDEEP

      98304:Q0oUcJEe9biTp9dPLASQlFVv0pXP/e+47PwY2h7:Q0cJEebgp9BLjYbaXPqPW7

    • Sets file execution options in registry

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Browser Extensions

1
T1176

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

7
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Tasks