General
-
Target
https://cdn.gilcdn.com/ContentMediaGenericFiles/97ae67c92f24b86e55231b388a333ef0-Full.rar?w=1&h=1&Expires=1723851283&Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9jZG4uZ2lsY2RuLmNvbS8qIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzIzODUxMjgzfX19XX0_&Signature=bsTetsdepm7zPBKRI6HQCJXXzn8efqxsoGbb6SqyoMB1i7zNm0D1Q-v2BhdPvPZMrmW9DHUkXpFQ~BacOM7QhlZYbR1ycbS8CCR9Py65khAz39WN~16hyaadft~QZ-o7E3x-oPS02RUVSgodf7Dkws1WaMLk9Q0~HGNp-3fe3gu4bhD~BjKRX2uyE~CRLDFRz1jpgfXNGheQLrRccrhj17hTrOVbtUSCGWv-sa9C8BfwFjhgOlqF1sqzJevkaCaDG0eduVbCcBHzgJOq~kzZjKVOvBbLVMNiPM6NL-aFq5Q-xk3LAs-xgf-eBnfSu0yrD9cvMGvuYeBThW5U9lYt1g__&Key-Pair-Id=K1FFKFZRWAZSB
-
Sample
240816-1s53sazare
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.gilcdn.com/ContentMediaGenericFiles/97ae67c92f24b86e55231b388a333ef0-Full.rar?w=1&h=1&Expires=1723851283&Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9jZG4uZ2lsY2RuLmNvbS8qIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzIzODUxMjgzfX19XX0_&Signature=bsTetsdepm7zPBKRI6HQCJXXzn8efqxsoGbb6SqyoMB1i7zNm0D1Q-v2BhdPvPZMrmW9DHUkXpFQ~BacOM7QhlZYbR1ycbS8CCR9Py65khAz39WN~16hyaadft~QZ-o7E3x-oPS02RUVSgodf7Dkws1WaMLk9Q0~HGNp-3fe3gu4bhD~BjKRX2uyE~CRLDFRz1jpgfXNGheQLrRccrhj17hTrOVbtUSCGWv-sa9C8BfwFjhgOlqF1sqzJevkaCaDG0eduVbCcBHzgJOq~kzZjKVOvBbLVMNiPM6NL-aFq5Q-xk3LAs-xgf-eBnfSu0yrD9cvMGvuYeBThW5U9lYt1g__&Key-Pair-Id=K1FFKFZRWAZSB
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
https://cdn.gilcdn.com/ContentMediaGenericFiles/97ae67c92f24b86e55231b388a333ef0-Full.rar?w=1&h=1&Expires=1723851283&Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9jZG4uZ2lsY2RuLmNvbS8qIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzIzODUxMjgzfX19XX0_&Signature=bsTetsdepm7zPBKRI6HQCJXXzn8efqxsoGbb6SqyoMB1i7zNm0D1Q-v2BhdPvPZMrmW9DHUkXpFQ~BacOM7QhlZYbR1ycbS8CCR9Py65khAz39WN~16hyaadft~QZ-o7E3x-oPS02RUVSgodf7Dkws1WaMLk9Q0~HGNp-3fe3gu4bhD~BjKRX2uyE~CRLDFRz1jpgfXNGheQLrRccrhj17hTrOVbtUSCGWv-sa9C8BfwFjhgOlqF1sqzJevkaCaDG0eduVbCcBHzgJOq~kzZjKVOvBbLVMNiPM6NL-aFq5Q-xk3LAs-xgf-eBnfSu0yrD9cvMGvuYeBThW5U9lYt1g__&Key-Pair-Id=K1FFKFZRWAZSB
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1