General

  • Target

    ChatGPT_0.12.0_windows_x86_64.msi

  • Size

    5.7MB

  • Sample

    240727-bvgqjaxhpr

  • MD5

    847a056f92429cb7c70a6a552da0d8fc

  • SHA1

    af0a839105e35afc69aade9423e7438483e32ad4

  • SHA256

    ed09b660a16215844f5072e6ea4821c17dcaa3eb9e3a48e864d9428850d48973

  • SHA512

    775782394f06b9fffdb9212e5970aaf2eedf3daaf9a5d4fc1a73723cde19692c5c82ce5f6015d6ddb3f5cde192eda5bb3539eab022f2e7720f039aa8fdfbd0fe

  • SSDEEP

    98304:5PWu3MYRTcS4epUAOkOwJ4gnbzzZxGt0NgUh+Ugg3MioeIyzwOV1h4ucWPMcrE:NWu3MYRYe/OkzPzat0uUh+UN3hoeBwI4

Malware Config

Targets

    • Target

      ChatGPT_0.12.0_windows_x86_64.msi

    • Size

      5.7MB

    • MD5

      847a056f92429cb7c70a6a552da0d8fc

    • SHA1

      af0a839105e35afc69aade9423e7438483e32ad4

    • SHA256

      ed09b660a16215844f5072e6ea4821c17dcaa3eb9e3a48e864d9428850d48973

    • SHA512

      775782394f06b9fffdb9212e5970aaf2eedf3daaf9a5d4fc1a73723cde19692c5c82ce5f6015d6ddb3f5cde192eda5bb3539eab022f2e7720f039aa8fdfbd0fe

    • SSDEEP

      98304:5PWu3MYRTcS4epUAOkOwJ4gnbzzZxGt0NgUh+Ugg3MioeIyzwOV1h4ucWPMcrE:NWu3MYRYe/OkzPzat0uUh+UN3hoeBwI4

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

3
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Installer Packages

1
T1546.016

Privilege Escalation

Event Triggered Execution

3
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Installer Packages

1
T1546.016

Defense Evasion

System Binary Proxy Execution

1
T1218

Msiexec

1
T1218.007

Discovery

Query Registry

5
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

5
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

System Network Configuration Discovery

1
T1016

Internet Connection Discovery

1
T1016.001

Tasks