General
-
Target
Win 10 Tweaker.exe
-
Size
1.7MB
-
Sample
240517-wr8easca2w
-
MD5
77b54971168d1a346b2d7aa6a75e71fb
-
SHA1
c52deb0a93f6bcbc11918204d5674ab2f6903674
-
SHA256
ec8004099797e64844f6a385b733e4b4847d19675b686e723f7e89296f2f4b1b
-
SHA512
19a6b3502d4f6dd1d80da9b4ab59ddf5e884db73287b1e911f2b2d2660ffca57c1bfa99361de993430cd69a50a9413bac8a8a64148cd8a299f275e361caddb40
-
SSDEEP
24576:p5RKJMBbsricwGQpCt/RkDuwHf9iJFbVwYgaQ9Dw9is5d2uvnUwloFB0bLj8j9uz:p50JjrnwO4N0FBwxlwp9o8b/lOi
Static task
static1
Behavioral task
behavioral1
Sample
Win 10 Tweaker.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Win 10 Tweaker.exe
-
Size
1.7MB
-
MD5
77b54971168d1a346b2d7aa6a75e71fb
-
SHA1
c52deb0a93f6bcbc11918204d5674ab2f6903674
-
SHA256
ec8004099797e64844f6a385b733e4b4847d19675b686e723f7e89296f2f4b1b
-
SHA512
19a6b3502d4f6dd1d80da9b4ab59ddf5e884db73287b1e911f2b2d2660ffca57c1bfa99361de993430cd69a50a9413bac8a8a64148cd8a299f275e361caddb40
-
SSDEEP
24576:p5RKJMBbsricwGQpCt/RkDuwHf9iJFbVwYgaQ9Dw9is5d2uvnUwloFB0bLj8j9uz:p50JjrnwO4N0FBwxlwp9o8b/lOi
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Modifies Windows Firewall
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies boot configuration data using bcdedit
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
10