General

  • Target

    QuikWipes.bat

  • Size

    47KB

  • Sample

    240524-e1x69adb4z

  • MD5

    4159f980bd03895ac2431f5264cbe0cf

  • SHA1

    6b197f4f4ccf3f201c1ecc0ea145e79895acfb9f

  • SHA256

    6d6c1778838f50e53bf5f2858df28d4f7e50c376c4018d7a7ce1036ff99730f2

  • SHA512

    181bf22d9446b2904dfc2cd8c76f66a43b99650d7c2db180646f00126838ba0c58afc849572e65eb613ba7f37df58a17d3a85b4742a14b7bde0e7135a50af0d8

  • SSDEEP

    192:a111111111111111111111111111111111111111111111111111111111111111:y

Malware Config

Targets

    • Target

      QuikWipes.bat

    • Size

      47KB

    • MD5

      4159f980bd03895ac2431f5264cbe0cf

    • SHA1

      6b197f4f4ccf3f201c1ecc0ea145e79895acfb9f

    • SHA256

      6d6c1778838f50e53bf5f2858df28d4f7e50c376c4018d7a7ce1036ff99730f2

    • SHA512

      181bf22d9446b2904dfc2cd8c76f66a43b99650d7c2db180646f00126838ba0c58afc849572e65eb613ba7f37df58a17d3a85b4742a14b7bde0e7135a50af0d8

    • SSDEEP

      192:a111111111111111111111111111111111111111111111111111111111111111:y

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Modifies firewall policy service

    • Modifies security service

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Modifies Installed Components in the registry

    • Registers new Print Monitor

    • Sets file execution options in registry

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

6
T1547

Registry Run Keys / Startup Folder

6
T1547.001

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Browser Extensions

1
T1176

Privilege Escalation

Boot or Logon Autostart Execution

6
T1547

Registry Run Keys / Startup Folder

6
T1547.001

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

11
T1112

Subvert Trust Controls

1
T1553

SIP and Trust Provider Hijacking

1
T1553.003

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

5
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks