Resubmissions

23-04-2024 10:26

240423-mgvwsafd8y 10

23-04-2024 10:23

240423-me6khafe27 6

General

  • Target

    cooltext453484957556738.png

  • Size

    49KB

  • Sample

    240423-mgvwsafd8y

  • MD5

    b50b046a59c8a141859baa0142dcfde6

  • SHA1

    4bff6f382e7b66de6a680a5fe3d68b7b65efdca9

  • SHA256

    8e6bc25b166d3d300d149b772f77594442fd91029ed08c5d4da3cacd8177cf81

  • SHA512

    2218bdd831beda42b74fff33d6ff3d4426605856c749d4e107177bf0c34a851504e451289c41076751a4fe0203a87bcf6c04ea2513f3d7027a8bc3d95b0b8471

  • SSDEEP

    1536:gSD4LiAGmEeNVMf+COViHPyuFeFUL0iR45X:gWkPMf+COVBiqi2R

Malware Config

Targets

    • Target

      cooltext453484957556738.png

    • Size

      49KB

    • MD5

      b50b046a59c8a141859baa0142dcfde6

    • SHA1

      4bff6f382e7b66de6a680a5fe3d68b7b65efdca9

    • SHA256

      8e6bc25b166d3d300d149b772f77594442fd91029ed08c5d4da3cacd8177cf81

    • SHA512

      2218bdd831beda42b74fff33d6ff3d4426605856c749d4e107177bf0c34a851504e451289c41076751a4fe0203a87bcf6c04ea2513f3d7027a8bc3d95b0b8471

    • SSDEEP

      1536:gSD4LiAGmEeNVMf+COViHPyuFeFUL0iR45X:gWkPMf+COVBiqi2R

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Modifies system executable filetype association

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks