General

  • Target

    Install.exe

  • Size

    162KB

  • Sample

    240725-n7l71axepj

  • MD5

    b05e31c3b9e6af68dcea0843167f7e70

  • SHA1

    ae1d9f4e658d61e3d9325ad10032a92436e2adf0

  • SHA256

    3f532d32ea2d79972e43613cc0c8cbcc67ca9cd07cc76176327507d6ff6a8c98

  • SHA512

    6b5548c326db7850c4206672564a2f7fff5aca91e18e2ca46d5c4047f10fb7507a87a1b63f11bafa3c7160168521bd4bdd0190f964779161e04d7f66fafbafd3

  • SSDEEP

    3072:WQpsrf7jq6uO5hfTXU3fjIqTbULcMmwAHVL6+C71mv/HiSHe3XoVrlkebmU:WQpsrf7jq6f5BTXU3c0VMm35C71wAoVR

Malware Config

Targets

    • Target

      Install.exe

    • Size

      162KB

    • MD5

      b05e31c3b9e6af68dcea0843167f7e70

    • SHA1

      ae1d9f4e658d61e3d9325ad10032a92436e2adf0

    • SHA256

      3f532d32ea2d79972e43613cc0c8cbcc67ca9cd07cc76176327507d6ff6a8c98

    • SHA512

      6b5548c326db7850c4206672564a2f7fff5aca91e18e2ca46d5c4047f10fb7507a87a1b63f11bafa3c7160168521bd4bdd0190f964779161e04d7f66fafbafd3

    • SSDEEP

      3072:WQpsrf7jq6uO5hfTXU3fjIqTbULcMmwAHVL6+C71mv/HiSHe3XoVrlkebmU:WQpsrf7jq6f5BTXU3c0VMm35C71wAoVR

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks