Resubmissions

10-04-2024 19:04

240410-xrc4tsca3w 7

10-04-2024 18:53

240410-xjnwcsbf7t 7

10-04-2024 18:50

240410-xhb56sbf21 1

10-04-2024 18:40

240410-xbpspabd2s 10

10-04-2024 18:37

240410-w9s3bsgb72 8

10-04-2024 18:27

240410-w3qzdsba5v 4

10-04-2024 18:24

240410-w15d1afh52 1

10-04-2024 18:13

240410-wtrjkaff78 1

10-04-2024 18:07

240410-wqcw1aaf4x 6

General

  • Target

    sample

  • Size

    18KB

  • Sample

    240410-xbpspabd2s

  • MD5

    975aed651740cac29bc0fa6e3992d3cc

  • SHA1

    42033f32c97b6be4e446c0a77690745eafc28112

  • SHA256

    c7a53cef7508f2abb86996be29a075c2ea63bf09b1bb08e1b1b7a592cf074e60

  • SHA512

    53a57fbf3952c5f0e08781879747d059d27a81f58c3f1a9f38c8763ba7aa8d31849e9797092c7624311b626e9aedd4937956bdefc54350ade3d480b04d1eb87d

  • SSDEEP

    384:rTqN2DpmReVoOs41N9ylKeGM+U8HhhbG167uS2LjFrSE3+dVJCBXQL:rTqYBVoOs41ryI1M0Bhb68CFrSEMJQQL

Malware Config

Targets

    • Target

      sample

    • Size

      18KB

    • MD5

      975aed651740cac29bc0fa6e3992d3cc

    • SHA1

      42033f32c97b6be4e446c0a77690745eafc28112

    • SHA256

      c7a53cef7508f2abb86996be29a075c2ea63bf09b1bb08e1b1b7a592cf074e60

    • SHA512

      53a57fbf3952c5f0e08781879747d059d27a81f58c3f1a9f38c8763ba7aa8d31849e9797092c7624311b626e9aedd4937956bdefc54350ade3d480b04d1eb87d

    • SSDEEP

      384:rTqN2DpmReVoOs41N9ylKeGM+U8HhhbG167uS2LjFrSE3+dVJCBXQL:rTqYBVoOs41ryI1M0Bhb68CFrSEMJQQL

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Modifies system executable filetype association

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks