Resubmissions

15-07-2024 12:22

240715-pj7dpszhrl 8

14-07-2024 17:11

240714-vqpp5asckh 8

14-07-2024 17:07

240714-vmz2pasbjb 10

14-07-2024 16:55

240714-ve3gvaygnq 8

01-05-2024 09:05

240501-k2a11abe8v 10

24-03-2023 19:33

230324-x9t53aba7y 10

24-03-2023 19:25

230324-x49nkaba4t 10

General

  • Target

    Replace.exe

  • Size

    34.8MB

  • Sample

    240715-pj7dpszhrl

  • MD5

    fd5cd14325c51ecab6a57d1d665f8852

  • SHA1

    ea16aa0f197210437733c63a42a8f1dd6442d753

  • SHA256

    d433cd0ba6b6850a9f616b3b89754a005699547d4e04fadb75cade770156cfd1

  • SHA512

    9a2e4c8baa01fbafe6968905daeb8d3b7eb62c09d1d7584e973ad1c23d964093e161a51a7390dfaa598d2657f45ca17bf00b5055aeaf0441f875ddb364741d71

  • SSDEEP

    786432:i9hj60qHOBbQcVM3sct6C2ubdsUeGXV4yQnb+LQgRkrm12PYfrB:i9kH+o5sG2ysbhrmka

Malware Config

Targets

    • Target

      Replace.exe

    • Size

      34.8MB

    • MD5

      fd5cd14325c51ecab6a57d1d665f8852

    • SHA1

      ea16aa0f197210437733c63a42a8f1dd6442d753

    • SHA256

      d433cd0ba6b6850a9f616b3b89754a005699547d4e04fadb75cade770156cfd1

    • SHA512

      9a2e4c8baa01fbafe6968905daeb8d3b7eb62c09d1d7584e973ad1c23d964093e161a51a7390dfaa598d2657f45ca17bf00b5055aeaf0441f875ddb364741d71

    • SSDEEP

      786432:i9hj60qHOBbQcVM3sct6C2ubdsUeGXV4yQnb+LQgRkrm12PYfrB:i9kH+o5sG2ysbhrmka

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks