General

  • Target

    avast_free_antivirus_setup_online.exe

  • Size

    257KB

  • Sample

    240618-nk5e3awarj

  • MD5

    ce169cbd5382e4d27c1e9fa89abd8381

  • SHA1

    5a64dad18be3432a57416798df471bb951b71880

  • SHA256

    48a74098b5052182949091bf3a477bfa86de9f6bad129c371a99a1eaa00b5316

  • SHA512

    038bfb13b5bd8de6fb6a850419619803289013bda1878503e333cde3b8b724caff71cccbd107d9d632f1eda157c556b4f103f86a94a5785d81399ac578f07340

  • SSDEEP

    3072:l2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCozOhhOn+T9:l0KgGwHqwOOELha+sm2D2+Uhnguf7J

Malware Config

Targets

    • Target

      avast_free_antivirus_setup_online.exe

    • Size

      257KB

    • MD5

      ce169cbd5382e4d27c1e9fa89abd8381

    • SHA1

      5a64dad18be3432a57416798df471bb951b71880

    • SHA256

      48a74098b5052182949091bf3a477bfa86de9f6bad129c371a99a1eaa00b5316

    • SHA512

      038bfb13b5bd8de6fb6a850419619803289013bda1878503e333cde3b8b724caff71cccbd107d9d632f1eda157c556b4f103f86a94a5785d81399ac578f07340

    • SSDEEP

      3072:l2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCozOhhOn+T9:l0KgGwHqwOOELha+sm2D2+Uhnguf7J

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Impair Defenses: Safe Mode Boot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Safe Mode Boot

1
T1562.009

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

5
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks