General

  • Target

    ADZP 20 Complex.cmd

  • Size

    22KB

  • Sample

    240707-3ewnas1fqm

  • MD5

    3388c1be1e2505fb672d7285d77e3ebb

  • SHA1

    bf44a40c34390e99d2cf62625a42348465b48df6

  • SHA256

    38d50c545102dfa59a5faf795d9fdcbb0a07573453963834ae8b98a76689cffe

  • SHA512

    166e1e232b0559f5b89aa99385ae80590197b1b0f2c2a028065d371ec5f3a06fab8e58d5a65ac15cb64fdadcd37df5f21569c3c73d475624a8e0f1ba7085127a

  • SSDEEP

    384:2iJdAbrM21q0j0L1qEzdQ8PigfwTxX823JWo3yzKpMg:5bAUAW17JQrgodX/BMg

Malware Config

Targets

    • Target

      ADZP 20 Complex.cmd

    • Size

      22KB

    • MD5

      3388c1be1e2505fb672d7285d77e3ebb

    • SHA1

      bf44a40c34390e99d2cf62625a42348465b48df6

    • SHA256

      38d50c545102dfa59a5faf795d9fdcbb0a07573453963834ae8b98a76689cffe

    • SHA512

      166e1e232b0559f5b89aa99385ae80590197b1b0f2c2a028065d371ec5f3a06fab8e58d5a65ac15cb64fdadcd37df5f21569c3c73d475624a8e0f1ba7085127a

    • SSDEEP

      384:2iJdAbrM21q0j0L1qEzdQ8PigfwTxX823JWo3yzKpMg:5bAUAW17JQrgodX/BMg

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Modifies boot configuration data using bcdedit

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks