General

  • Target

    tmp

  • Size

    48KB

  • Sample

    240422-jndpashc2y

  • MD5

    768b7b0bc0eeb12c635b7964c718ec5f

  • SHA1

    2478a9f51b8c14e3a6e4de42d799520e33387589

  • SHA256

    10a7e65a3a7aa1a7bbf4c0f412425d840df9f6d211f3c1badc41240f4145d501

  • SHA512

    067ce6ef6c7fd25d65f7e4f751581df3a365374230e80a9eb0890831530d3b6b596c1e22fff8f3524a9586c35f927666ae68e2407ecf1805a534fa2298a129c9

  • SSDEEP

    768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67xHhPC:Ub1MsHz3JDwhyWr+N95OTga6O

Score
10/10

Malware Config

Targets

    • Target

      tmp

    • Size

      48KB

    • MD5

      768b7b0bc0eeb12c635b7964c718ec5f

    • SHA1

      2478a9f51b8c14e3a6e4de42d799520e33387589

    • SHA256

      10a7e65a3a7aa1a7bbf4c0f412425d840df9f6d211f3c1badc41240f4145d501

    • SHA512

      067ce6ef6c7fd25d65f7e4f751581df3a365374230e80a9eb0890831530d3b6b596c1e22fff8f3524a9586c35f927666ae68e2407ecf1805a534fa2298a129c9

    • SSDEEP

      768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67xHhPC:Ub1MsHz3JDwhyWr+N95OTga6O

    Score
    8/10
    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks