General

  • Target

    Windows_Activator_Tool.bat

  • Size

    435KB

  • Sample

    240503-jst7vacd23

  • MD5

    153799a818cb95fd5803fead4fbe3e7a

  • SHA1

    20c374986e4050265de2914c3993f6b22d6de460

  • SHA256

    835b99cbe7d16b1020a2b0fd94c356742528e94d66d445401b7057524c86ba3e

  • SHA512

    88af58dad86dd07be1f9fdbf6854f05579f2093360da939f52e8fd4c25f7cbbcdef0f1fe95bcedce00e0c88bf6c0a069f44cdb7be4f0b469ea2722d80e7eaa8c

  • SSDEEP

    3072:/xdR3S9mud2TrRMP0u+RciNiYbRd8nVFR3mP5sLtV7bJuAMTVFp6zGDNSCE2K0Y5:xbBHu+R7rLo97bJu9p6zGDNS0KROuCC

Malware Config

Targets

    • Target

      Windows_Activator_Tool.bat

    • Size

      435KB

    • MD5

      153799a818cb95fd5803fead4fbe3e7a

    • SHA1

      20c374986e4050265de2914c3993f6b22d6de460

    • SHA256

      835b99cbe7d16b1020a2b0fd94c356742528e94d66d445401b7057524c86ba3e

    • SHA512

      88af58dad86dd07be1f9fdbf6854f05579f2093360da939f52e8fd4c25f7cbbcdef0f1fe95bcedce00e0c88bf6c0a069f44cdb7be4f0b469ea2722d80e7eaa8c

    • SSDEEP

      3072:/xdR3S9mud2TrRMP0u+RciNiYbRd8nVFR3mP5sLtV7bJuAMTVFp6zGDNSCE2K0Y5:xbBHu+R7rLo97bJu9p6zGDNS0KROuCC

    • Creates new service(s)

    • Downloads MZ/PE file

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Registers COM server for autorun

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks