General

  • Target

    teracopy-3-17.exe

  • Size

    11.8MB

  • Sample

    240618-vfpmdawemm

  • MD5

    d704e453e065a23ed414927d9b203086

  • SHA1

    352e4b98faebc35f5c8cfeaebb7bcb36d7c7fbfc

  • SHA256

    ac03db52bb68a013d3a8bf4db703ec11976fa1d0aa557eb988e3f926a26656cf

  • SHA512

    0ec2c8cd14a7f4dfd704b19729239ee78e54fc1fb87ba1a2a80da4b7d595fd573861271ca220c3a7b264209ceed1ca96da12d6bdf2b34c35771790cd6337cf49

  • SSDEEP

    196608:AAKBx4px+sN23RSEfvYfXf1v3j+FX3/yXg3Kf5T72gFUbUamFbSf4k5EBGUQ:AAK/4px/23bfvYvf1bI/8RfVGwdFbSfD

Malware Config

Targets

    • Target

      teracopy-3-17.exe

    • Size

      11.8MB

    • MD5

      d704e453e065a23ed414927d9b203086

    • SHA1

      352e4b98faebc35f5c8cfeaebb7bcb36d7c7fbfc

    • SHA256

      ac03db52bb68a013d3a8bf4db703ec11976fa1d0aa557eb988e3f926a26656cf

    • SHA512

      0ec2c8cd14a7f4dfd704b19729239ee78e54fc1fb87ba1a2a80da4b7d595fd573861271ca220c3a7b264209ceed1ca96da12d6bdf2b34c35771790cd6337cf49

    • SSDEEP

      196608:AAKBx4px+sN23RSEfvYfXf1v3j+FX3/yXg3Kf5T72gFUbUamFbSf4k5EBGUQ:AAK/4px/23bfvYvf1bI/8RfVGwdFbSfD

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

2
T1546

Change Default File Association

1
T1546.001

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

2
T1546

Change Default File Association

1
T1546.001

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks