General

  • Target

    .

  • Size

    2KB

  • Sample

    240420-wnbwxseb86

  • MD5

    c442cc68447b7b6fdc5846577e7e173f

  • SHA1

    0554f23c529744a2e81172ae3cc78576dfdcf699

  • SHA256

    3a0e5c3f6bee2df8c440f503811b07fd2aa2357cf5c4f0ea2db2b40e063a096f

  • SHA512

    705488a85c45b018d7520fde93751b86b3518357cea077627efc65c4482c5f89b974324d875dad24c8fdd4df65482771ae9b4d5dc676333cf211cf35b4f3d02a

Malware Config

Targets

    • Target

      .

    • Size

      2KB

    • MD5

      c442cc68447b7b6fdc5846577e7e173f

    • SHA1

      0554f23c529744a2e81172ae3cc78576dfdcf699

    • SHA256

      3a0e5c3f6bee2df8c440f503811b07fd2aa2357cf5c4f0ea2db2b40e063a096f

    • SHA512

      705488a85c45b018d7520fde93751b86b3518357cea077627efc65c4482c5f89b974324d875dad24c8fdd4df65482771ae9b4d5dc676333cf211cf35b4f3d02a

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies AppInit DLL entries

    • Modifies Installed Components in the registry

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Defense Evasion

Modify Registry

4
T1112

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

5
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks