General

  • Target

    engineer-taunt.gif

  • Size

    279KB

  • Sample

    240620-2v8gcsvhrq

  • MD5

    8a9e3be06ec8496c7f1a4233876b0697

  • SHA1

    1d29ad9068d227f89009d610d91cca502591bf46

  • SHA256

    f19abff1a72b1ef08d57541a0d21908b7bf3ae6797d1bcf08c6a81a7c312393f

  • SHA512

    f2af39fc536b6b56a485653bfa5b07ea3d3d4a892a1f410c62d13ade46881f321ff79cbfdbf2cfb2a4e82502c24d74ca1ec4bf310d714bdf70c8ddd3ab93ad9b

  • SSDEEP

    6144:4pI6FKD9iEziUIicrzC4CAXJHUqMM4XiU7XQzY0yWjvYM+:4p1oiYozMAWq14SU7gzRjvP+

Malware Config

Targets

    • Target

      engineer-taunt.gif

    • Size

      279KB

    • MD5

      8a9e3be06ec8496c7f1a4233876b0697

    • SHA1

      1d29ad9068d227f89009d610d91cca502591bf46

    • SHA256

      f19abff1a72b1ef08d57541a0d21908b7bf3ae6797d1bcf08c6a81a7c312393f

    • SHA512

      f2af39fc536b6b56a485653bfa5b07ea3d3d4a892a1f410c62d13ade46881f321ff79cbfdbf2cfb2a4e82502c24d74ca1ec4bf310d714bdf70c8ddd3ab93ad9b

    • SSDEEP

      6144:4pI6FKD9iEziUIicrzC4CAXJHUqMM4XiU7XQzY0yWjvYM+:4p1oiYozMAWq14SU7gzRjvP+

    • Possible privilege escalation attempt

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

JavaScript

1
T1059.007

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

5
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Tasks