General

  • Target

    00b7eec8946cdf920a8153e8d3f4475e

  • Size

    2.2MB

  • Sample

    231229-xafhmacahn

  • MD5

    00b7eec8946cdf920a8153e8d3f4475e

  • SHA1

    9fa1c2d379aa9d21e6dfcdb55097b1eacfcb7b5f

  • SHA256

    fe3caabf26e5ae965ad944b70b5ab0026aee8b338317f4e573c72c609988d277

  • SHA512

    d0c249a811947d2bc129c38934f076edc821fa80fa3f6904812d550a24390e6e5d87d2156ae0dc183575e7a632af945bb64736d49d1821b1e6620f50c3aa9b9f

  • SSDEEP

    49152:AtKOxSdaKij7cpXoI99JXy2x4SqHyY7dzXh0AWDQwGqJu:AFSUKijkX59JXSys0frGqw

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.coolsecupdate.info/?0=115&1=1&2=1&3=41&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=qmjgqsrkie&14=1

Targets

    • Target

      00b7eec8946cdf920a8153e8d3f4475e

    • Size

      2.2MB

    • MD5

      00b7eec8946cdf920a8153e8d3f4475e

    • SHA1

      9fa1c2d379aa9d21e6dfcdb55097b1eacfcb7b5f

    • SHA256

      fe3caabf26e5ae965ad944b70b5ab0026aee8b338317f4e573c72c609988d277

    • SHA512

      d0c249a811947d2bc129c38934f076edc821fa80fa3f6904812d550a24390e6e5d87d2156ae0dc183575e7a632af945bb64736d49d1821b1e6620f50c3aa9b9f

    • SSDEEP

      49152:AtKOxSdaKij7cpXoI99JXy2x4SqHyY7dzXh0AWDQwGqJu:AFSUKijkX59JXSys0frGqw

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Sets file execution options in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

6
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks