General

  • Target

    360TS_Setup_Mini_WW_InstallRox_CPI202211_6.6.0.1054.exe

  • Size

    1MB

  • Sample

    230922-fbz5zsfa49

  • MD5

    aa3602359bb93695da27345d82a95c77

  • SHA1

    9cb550458f95d631fef3a89144fc9283d6c9f75a

  • SHA256

    e9225898ffe63c67058ea7e7eb5e0dc2a9ce286e83624bd85604142a07619e7d

  • SHA512

    adf43781d3f1fec56bc9cdcd1d4a8ddf1c4321206b16f70968b6ffccb59c943aed77c1192bf701ccc1ab2ce0f29b77eb76a33eba47d129a9248b61476db78a36

  • SSDEEP

    24576:1D1YS7FpyUxT3DC2O1zj1SqdAGFQZIxmC45UJoeXF9w:wQ5xT3DDWzjYq+ZIgL5UJoek

Malware Config

Targets

    • Target

      360TS_Setup_Mini_WW_InstallRox_CPI202211_6.6.0.1054.exe

    • Size

      1MB

    • MD5

      aa3602359bb93695da27345d82a95c77

    • SHA1

      9cb550458f95d631fef3a89144fc9283d6c9f75a

    • SHA256

      e9225898ffe63c67058ea7e7eb5e0dc2a9ce286e83624bd85604142a07619e7d

    • SHA512

      adf43781d3f1fec56bc9cdcd1d4a8ddf1c4321206b16f70968b6ffccb59c943aed77c1192bf701ccc1ab2ce0f29b77eb76a33eba47d129a9248b61476db78a36

    • SSDEEP

      24576:1D1YS7FpyUxT3DC2O1zj1SqdAGFQZIxmC45UJoeXF9w:wQ5xT3DDWzjYq+ZIgL5UJoek

    • Modifies boot configuration data using bcdedit

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Installed Components in the registry

    • Sets service image path in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

4
T1547

Registry Run Keys / Startup Folder

4
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

4
T1547

Registry Run Keys / Startup Folder

4
T1547.001

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

5
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

System Information Discovery

5
T1082

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Tasks