General

  • Target

    googlesketchupwen.exe

  • Size

    34.1MB

  • Sample

    240204-z42dasbae5

  • MD5

    80cc431668bf57c29fc7f1f4e7bae6ee

  • SHA1

    f0628e6f05241f91e4f36d6be3b8685a408ad12b

  • SHA256

    e50c1b36131d72437eb32a124a5208fad22dc22b843683cfb520e1ef172b8352

  • SHA512

    e34848ca3c7aaec0a8f23c7bb71cdd5c9ff0611724892936597f647959e93879fcf3ef470bafd77563fd62717e914e4403a801b9b6528e84c73421f21e114134

  • SSDEEP

    786432:cfToV5inUGUlc66VjgX6fFbV6jWX1BkO1zLeZU/OXU:OTSRSVi6MWX1V5xp

Score
9/10

Malware Config

Targets

    • Target

      googlesketchupwen.exe

    • Size

      34.1MB

    • MD5

      80cc431668bf57c29fc7f1f4e7bae6ee

    • SHA1

      f0628e6f05241f91e4f36d6be3b8685a408ad12b

    • SHA256

      e50c1b36131d72437eb32a124a5208fad22dc22b843683cfb520e1ef172b8352

    • SHA512

      e34848ca3c7aaec0a8f23c7bb71cdd5c9ff0611724892936597f647959e93879fcf3ef470bafd77563fd62717e914e4403a801b9b6528e84c73421f21e114134

    • SSDEEP

      786432:cfToV5inUGUlc66VjgX6fFbV6jWX1BkO1zLeZU/OXU:OTSRSVi6MWX1V5xp

    Score
    9/10
    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks