General

  • Target

    901cec222bef9173d884fcd170a7d100

  • Size

    2.2MB

  • Sample

    240204-zjhepaacg7

  • MD5

    901cec222bef9173d884fcd170a7d100

  • SHA1

    0e0572af28ca58f8cc75464e6eb0a4f3c9441c8a

  • SHA256

    ea57a2c8f5a67893e8017873944a66459454e85caa8111d658142c1e5b649d0f

  • SHA512

    9f7ae63665e7634e5ee8904442f2e1cc5c7e227466e88c24c334a2e2f4171bb56c637324725e2f9766d28bfce52b10beb05640d7f57c233293b8ecb4101966a6

  • SSDEEP

    49152:AtKOxEdZnHsIpu7ro2pYwemN0Cz4aFXwZOwmtU3jaBYhfm8alB+tXP:AFErMIwbye5pFgxmtUmmeZWP

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.coolsecupdate.info/?0=115&1=1&2=1&3=42&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=hljibwhwht&14=1

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.coolsecupdate.info/?0=115&1=1&2=1&3=42&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=glhflaywem&14=1

Targets

    • Target

      901cec222bef9173d884fcd170a7d100

    • Size

      2.2MB

    • MD5

      901cec222bef9173d884fcd170a7d100

    • SHA1

      0e0572af28ca58f8cc75464e6eb0a4f3c9441c8a

    • SHA256

      ea57a2c8f5a67893e8017873944a66459454e85caa8111d658142c1e5b649d0f

    • SHA512

      9f7ae63665e7634e5ee8904442f2e1cc5c7e227466e88c24c334a2e2f4171bb56c637324725e2f9766d28bfce52b10beb05640d7f57c233293b8ecb4101966a6

    • SSDEEP

      49152:AtKOxEdZnHsIpu7ro2pYwemN0Cz4aFXwZOwmtU3jaBYhfm8alB+tXP:AFErMIwbye5pFgxmtUmmeZWP

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Sets file execution options in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

6
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Impact

Service Stop

1
T1489

Tasks