General

  • Target

    data1.sfx.bin

  • Size

    250.0MB

  • Sample

    240426-p6ay1scg8w

  • MD5

    1672d51cae4b86fadff4745816f4d2a0

  • SHA1

    2c55f18d84deb5eca663118f1c53f2a0453c0308

  • SHA256

    b7dd9fe69c8b2431087329eb78c9fb1bdbcb511194aae0a42238cce026505b6e

  • SHA512

    8889bb4a303040eaee03cd1ed2848e861a854fd0105f6fa6eb28b86344e2e310af7d6d7a08d8c2fe2fd6bfc5bf8db5b48d505245bc52ef650e3ddb4e1fa06fb2

  • SSDEEP

    6291456:b2VJrlgKMQ8U7eXi4mpmtXN5/hkSnAx7MWKDZ1MqOjtC778geXeM0Q:2lmKMqvpCNBhJ1F1MqOjtk7Ox

Malware Config

Targets

    • Target

      data1.sfx.bin

    • Size

      250.0MB

    • MD5

      1672d51cae4b86fadff4745816f4d2a0

    • SHA1

      2c55f18d84deb5eca663118f1c53f2a0453c0308

    • SHA256

      b7dd9fe69c8b2431087329eb78c9fb1bdbcb511194aae0a42238cce026505b6e

    • SHA512

      8889bb4a303040eaee03cd1ed2848e861a854fd0105f6fa6eb28b86344e2e310af7d6d7a08d8c2fe2fd6bfc5bf8db5b48d505245bc52ef650e3ddb4e1fa06fb2

    • SSDEEP

      6291456:b2VJrlgKMQ8U7eXi4mpmtXN5/hkSnAx7MWKDZ1MqOjtC778geXeM0Q:2lmKMqvpCNBhJ1F1MqOjtk7Ox

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender notification settings

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

4
T1543

Windows Service

4
T1543.003

Account Manipulation

1
T1098

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

4
T1543

Windows Service

4
T1543.003

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

4
T1562

Disable or Modify Tools

2
T1562.001

Disable or Modify System Firewall

1
T1562.004

Virtualization/Sandbox Evasion

1
T1497

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Impact

Service Stop

1
T1489

Tasks