Resubmissions
22-06-2024 22:27
240622-2dh55sxcqg 122-06-2024 20:53
240622-zpntnaterd 1022-06-2024 20:49
240622-zl5b8stdra 822-06-2024 20:44
240622-zh4xastcpe 622-06-2024 20:43
240622-zhk47axfmn 622-06-2024 20:41
240622-zgtd6sxfjr 622-06-2024 20:39
240622-zfnsastbmf 822-06-2024 20:39
240622-zfa67sxemq 621-06-2024 05:48
240621-ghrmvstcnp 821-06-2024 05:40
240621-gcwpmayhra 10General
-
Target
Pickles.mov
-
Size
3.2MB
-
Sample
240621-gcwpmayhra
-
MD5
07b8fab59b31c2051fd984770c3a0c9f
-
SHA1
c5c538f0df6cd623904be651d9f8b37524009f23
-
SHA256
10ee43270f9a89d833f8dfbef5ee304725c6922a12adeb65ec876e28e8149c06
-
SHA512
810fd9247aa6bb735d52e754c09ae30e0de115711ca7a3b4ffbd2dd01473a2c2f48f6884bd70a143addd5c9afaf96f535217f4b57a151a17375fc54f547b80bd
-
SSDEEP
49152:qkiSeTEQbR6yFrjL5vQN5wEdoAnQUR1T9OiOvMYmBTswaPg5aj3AOk02AMvGUev2:DQbEy1jlvmTQUFOtvMd5QjmFAMHcZyUU
Static task
static1
Behavioral task
behavioral1
Sample
Pickles.mov
Resource
win11-20240611-en
Malware Config
Targets
-
-
Target
Pickles.mov
-
Size
3.2MB
-
MD5
07b8fab59b31c2051fd984770c3a0c9f
-
SHA1
c5c538f0df6cd623904be651d9f8b37524009f23
-
SHA256
10ee43270f9a89d833f8dfbef5ee304725c6922a12adeb65ec876e28e8149c06
-
SHA512
810fd9247aa6bb735d52e754c09ae30e0de115711ca7a3b4ffbd2dd01473a2c2f48f6884bd70a143addd5c9afaf96f535217f4b57a151a17375fc54f547b80bd
-
SSDEEP
49152:qkiSeTEQbR6yFrjL5vQN5wEdoAnQUR1T9OiOvMYmBTswaPg5aj3AOk02AMvGUev2:DQbEy1jlvmTQUFOtvMd5QjmFAMHcZyUU
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Winlogon Helper DLL
1Active Setup
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Winlogon Helper DLL
1Active Setup
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Access Token Manipulation
1Create Process with Token
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Access Token Manipulation
1Create Process with Token
1