General

  • Target

    9d10d9227f165d4745f1571e6e4d2ea2.exe

  • Size

    63KB

  • Sample

    240103-rzm14shbd9

  • MD5

    9d10d9227f165d4745f1571e6e4d2ea2

  • SHA1

    769f5ef77705c13d247ebff035ac5eab3b0aa10d

  • SHA256

    0f88a503022e629204e8199848f5571918f7b8d723023ba8afb57b8dceba7538

  • SHA512

    1db602c88411388407b791e2afa41fb9e63085c512e3652eaeefa383a4becc5db4516f57c50d68001dfd806fea608c099bda2023615919993eadd08c99bb5b1e

  • SSDEEP

    1536:JiZpcklOpn+wruJ3cW8/QxJEN2uSzrCsxQYi7nouy8n:sZmt+wrqv8/EJzRxQYijoutn

Malware Config

Targets

    • Target

      9d10d9227f165d4745f1571e6e4d2ea2.exe

    • Size

      63KB

    • MD5

      9d10d9227f165d4745f1571e6e4d2ea2

    • SHA1

      769f5ef77705c13d247ebff035ac5eab3b0aa10d

    • SHA256

      0f88a503022e629204e8199848f5571918f7b8d723023ba8afb57b8dceba7538

    • SHA512

      1db602c88411388407b791e2afa41fb9e63085c512e3652eaeefa383a4becc5db4516f57c50d68001dfd806fea608c099bda2023615919993eadd08c99bb5b1e

    • SSDEEP

      1536:JiZpcklOpn+wruJ3cW8/QxJEN2uSzrCsxQYi7nouy8n:sZmt+wrqv8/EJzRxQYijoutn

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks