General

  • Target

    5e9e9feff79a516df439c031aed499e8df5337c21b1d3396ac53a5be95a89631

  • Size

    287KB

  • Sample

    240620-py4w5axhja

  • MD5

    75ecf319b39d6e6c8f30a943df43969b

  • SHA1

    b5f171ded06331b00830b425efce744c3a9ee7ec

  • SHA256

    5e9e9feff79a516df439c031aed499e8df5337c21b1d3396ac53a5be95a89631

  • SHA512

    eff7ad8c129b402282f349df7e75031acaa2981e575963411cf0e0850be102b6630285551057ebf49cf38a869a8b16a06d97c257d3d5186ce54e290bfa796839

  • SSDEEP

    3072:rheBqhy5aV5gpqY8sXwTEHXfGaNoM+/ORSs5G2Ms436TFZbYSeJLv4pqgGN0FzCr:rC01sX/fJx+/N6JOSeJT480F

Malware Config

Targets

    • Target

      5e9e9feff79a516df439c031aed499e8df5337c21b1d3396ac53a5be95a89631

    • Size

      287KB

    • MD5

      75ecf319b39d6e6c8f30a943df43969b

    • SHA1

      b5f171ded06331b00830b425efce744c3a9ee7ec

    • SHA256

      5e9e9feff79a516df439c031aed499e8df5337c21b1d3396ac53a5be95a89631

    • SHA512

      eff7ad8c129b402282f349df7e75031acaa2981e575963411cf0e0850be102b6630285551057ebf49cf38a869a8b16a06d97c257d3d5186ce54e290bfa796839

    • SSDEEP

      3072:rheBqhy5aV5gpqY8sXwTEHXfGaNoM+/ORSs5G2Ms436TFZbYSeJLv4pqgGN0FzCr:rC01sX/fJx+/N6JOSeJT480F

    • Creates new service(s)

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks