General

  • Target

    DELTA`S SUPPORT TOOL.exe

  • Size

    3.0MB

  • Sample

    240522-fl5hfsce98

  • MD5

    551c01bff1bdf4bdbe89a0ee348f54e4

  • SHA1

    a0e033049541b5cd73f1212efe6273229409408b

  • SHA256

    894d3fcd2439db97e252dbfe5fb555843e7f21ccd90b7cd1e48c3f3f9bf231cd

  • SHA512

    40d5fceccd7241ae858bd287a9168c535cf49b25eb482f5361dee67f7a5447762a849a468427996bcaf7c85ae8bbb05c84324a6cc180e5431e6b7eeb07e5a435

  • SSDEEP

    49152:8xmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxuihz4sX:8xx9NUFkQx753uWuCyyxuiH

Malware Config

Targets

    • Target

      DELTA`S SUPPORT TOOL.exe

    • Size

      3.0MB

    • MD5

      551c01bff1bdf4bdbe89a0ee348f54e4

    • SHA1

      a0e033049541b5cd73f1212efe6273229409408b

    • SHA256

      894d3fcd2439db97e252dbfe5fb555843e7f21ccd90b7cd1e48c3f3f9bf231cd

    • SHA512

      40d5fceccd7241ae858bd287a9168c535cf49b25eb482f5361dee67f7a5447762a849a468427996bcaf7c85ae8bbb05c84324a6cc180e5431e6b7eeb07e5a435

    • SSDEEP

      49152:8xmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxuihz4sX:8xx9NUFkQx753uWuCyyxuiH

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks