General

  • Target

    off.png

  • Size

    11KB

  • Sample

    240629-ncnscawfka

  • MD5

    c0ce4ee6fe7c9c9db2e9fc428554cab5

  • SHA1

    e8eb37e991a8c3a8de133c574f269c6f4b9e0d1c

  • SHA256

    d08b910654bb57b96568313cc0511fae9c596aed6a7cdfbdfd2a8cd51745fb22

  • SHA512

    e4b3daf33457c28b8eef466f9a8710077bdfa8bafc55a00e2c905d9c61e902e785d5ddbd5ec52a0ab393ccf1c971e4b6fea64f69b82111ecb1a1635bc6945ce8

  • SSDEEP

    192:kwcpOGlBIKrktaLJ6eYEFKV2hmivfS+28jd9xkPJjBq4+HrivvPu0lCpMyG4URdj:xIO4BI+kFYFKV2giF2WXuPJj84+0vjCG

Malware Config

Targets

    • Target

      off.png

    • Size

      11KB

    • MD5

      c0ce4ee6fe7c9c9db2e9fc428554cab5

    • SHA1

      e8eb37e991a8c3a8de133c574f269c6f4b9e0d1c

    • SHA256

      d08b910654bb57b96568313cc0511fae9c596aed6a7cdfbdfd2a8cd51745fb22

    • SHA512

      e4b3daf33457c28b8eef466f9a8710077bdfa8bafc55a00e2c905d9c61e902e785d5ddbd5ec52a0ab393ccf1c971e4b6fea64f69b82111ecb1a1635bc6945ce8

    • SSDEEP

      192:kwcpOGlBIKrktaLJ6eYEFKV2hmivfS+28jd9xkPJjBq4+HrivvPu0lCpMyG4URdj:xIO4BI+kFYFKV2giF2WXuPJj84+0vjCG

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks