General

  • Target

    MAS_AIO-CRC32_31F7FD1E.cmd

  • Size

    438KB

  • Sample

    240620-v82seatenq

  • MD5

    88d518ea04598e056440635851ba61db

  • SHA1

    22c62949a561e0172a8c1a870862cd7b64d09738

  • SHA256

    533e16e27044e4b3373290f23ffac3863481747bca5ae9de31c3b84396dee4e0

  • SHA512

    45af822ee9565a9962e6bcbfce93c31f15eaa39bad3bc6a97791366ec9547011c2ff933411d8b883ef54367dcc3588a1a737d63f1a528dedc1cdc98ab4aedecf

  • SSDEEP

    3072:M/dR3S9mF2TJRMP0u+RciNiYFRd8nVFR3mP5sLtV7bJuAMTVFp6zGDNSCE2K0xOn:KAnHu+R7VLo97bJu9p6zGDNS0KgOuCV

Malware Config

Targets

    • Target

      MAS_AIO-CRC32_31F7FD1E.cmd

    • Size

      438KB

    • MD5

      88d518ea04598e056440635851ba61db

    • SHA1

      22c62949a561e0172a8c1a870862cd7b64d09738

    • SHA256

      533e16e27044e4b3373290f23ffac3863481747bca5ae9de31c3b84396dee4e0

    • SHA512

      45af822ee9565a9962e6bcbfce93c31f15eaa39bad3bc6a97791366ec9547011c2ff933411d8b883ef54367dcc3588a1a737d63f1a528dedc1cdc98ab4aedecf

    • SSDEEP

      3072:M/dR3S9mF2TJRMP0u+RciNiYFRd8nVFR3mP5sLtV7bJuAMTVFp6zGDNSCE2K0xOn:KAnHu+R7VLo97bJu9p6zGDNS0KgOuCV

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks