Resubmissions

15-04-2024 11:28

240415-nk3lgadc23 10

15-04-2024 11:03

240415-m5vkxsfb3x 6

General

  • Target

    maxresdefault (1).jpg

  • Size

    124KB

  • Sample

    240415-nk3lgadc23

  • MD5

    ad32328a40d204f9cc587cf31186fb34

  • SHA1

    d178a1512c99bb04fcf374e0464c5aee5b3b5f1d

  • SHA256

    3dd5766499487377f602469b47baf8558d74279aee0f4bf3a5cb1c89d5e86f9a

  • SHA512

    2fdfd014b0a7b326d2d1904dacf1f6149ed94dc4080c079917cdbd36360f675228ed9083ce225d1a04189c1271dae10aa27a4e6114ec2d9faca6c3eaec07f3c7

  • SSDEEP

    3072:Fd+gI+a2i0mgMktj+SKX6uCyjOIT3LyFJYJWv:FsgI+xiFgJ+Dqf4LLyTYJWv

Malware Config

Targets

    • Target

      maxresdefault (1).jpg

    • Size

      124KB

    • MD5

      ad32328a40d204f9cc587cf31186fb34

    • SHA1

      d178a1512c99bb04fcf374e0464c5aee5b3b5f1d

    • SHA256

      3dd5766499487377f602469b47baf8558d74279aee0f4bf3a5cb1c89d5e86f9a

    • SHA512

      2fdfd014b0a7b326d2d1904dacf1f6149ed94dc4080c079917cdbd36360f675228ed9083ce225d1a04189c1271dae10aa27a4e6114ec2d9faca6c3eaec07f3c7

    • SSDEEP

      3072:Fd+gI+a2i0mgMktj+SKX6uCyjOIT3LyFJYJWv:FsgI+xiFgJ+Dqf4LLyTYJWv

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies file permissions

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks