General
-
Target
Isetup2.exe
-
Size
764KB
-
Sample
240519-q23znsag39
-
MD5
9ca07a18755fef4e505b233f3dddb6ea
-
SHA1
707705d5d4898eaef1238429447783db28554ba9
-
SHA256
4ea1ba89caf3d2c01cb65b9b56c0ec569a975df788572aa6a95537b546f3a2fc
-
SHA512
4d8e43c3398064ffd37868617d76814cb27ba541724f4a5943d05e4ffe03afcfbf7dc293b62107803cd7b9ff5c059b9241c27fee15d7e2ae9716164c6d836693
-
SSDEEP
12288:UBfdmQiTgXF/OHYMhHQ7hLJQ9w5DUAinUKjZjk3G1MxnIDN5hZ2+y5JHF:UBFmntH9i7RJQ9wiBMxIHhKHF
Static task
static1
Behavioral task
behavioral1
Sample
Isetup2.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Isetup2.exe
-
Size
764KB
-
MD5
9ca07a18755fef4e505b233f3dddb6ea
-
SHA1
707705d5d4898eaef1238429447783db28554ba9
-
SHA256
4ea1ba89caf3d2c01cb65b9b56c0ec569a975df788572aa6a95537b546f3a2fc
-
SHA512
4d8e43c3398064ffd37868617d76814cb27ba541724f4a5943d05e4ffe03afcfbf7dc293b62107803cd7b9ff5c059b9241c27fee15d7e2ae9716164c6d836693
-
SSDEEP
12288:UBfdmQiTgXF/OHYMhHQ7hLJQ9w5DUAinUKjZjk3G1MxnIDN5hZ2+y5JHF:UBFmntH9i7RJQ9wiBMxIHhKHF
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1