General

  • Target

    RingHeads32.exe

  • Size

    987KB

  • Sample

    240609-s5e35acg45

  • MD5

    df3fe88c0c5d914c89584a209d3f343b

  • SHA1

    bde45ba86bd9a326cdb1e9119e3869d91f638d79

  • SHA256

    76298c0a605f65ed70c9ae6932404ca4956adf202b3b823eea2e474c2acc0937

  • SHA512

    349a7586c12a289bef092644f0e96b37889488eec6c4990dc1d89ccd813da0e08cfe2ba9ee7b05ef67d94ed5e96dd549051b1045b95a8dd901a9df7226504df5

  • SSDEEP

    24576:ltA4KdTDcOq0afn0wsOPapdhTfIHJ8yu9j19wsxuJS/gOu:mdTwmavn9ipdhYJahLbu

Malware Config

Targets

    • Target

      RingHeads32.exe

    • Size

      987KB

    • MD5

      df3fe88c0c5d914c89584a209d3f343b

    • SHA1

      bde45ba86bd9a326cdb1e9119e3869d91f638d79

    • SHA256

      76298c0a605f65ed70c9ae6932404ca4956adf202b3b823eea2e474c2acc0937

    • SHA512

      349a7586c12a289bef092644f0e96b37889488eec6c4990dc1d89ccd813da0e08cfe2ba9ee7b05ef67d94ed5e96dd549051b1045b95a8dd901a9df7226504df5

    • SSDEEP

      24576:ltA4KdTDcOq0afn0wsOPapdhTfIHJ8yu9j19wsxuJS/gOu:mdTwmavn9ipdhYJahLbu

    • UAC bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables Task Manager via registry modification

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks