General

  • Target

    sample

  • Size

    77KB

  • Sample

    240822-mhzlcs1hlc

  • MD5

    6ab6e4a228d18e310ffc356dbbfd30de

  • SHA1

    ba26c210424198713f396939c91540812f218400

  • SHA256

    29c5f81b44a52d5a4978397351ec6d75e0f7f9644c01929ce3fa6d95a92b3317

  • SHA512

    d4951a105566937dd2aeae19515f04d53994f876a74498bee4166e2fa02a3ddb5828dc55a482270a1d4b420893cf9de5b22d98419fe512426887e1ca5571778e

  • SSDEEP

    1536:i6QJFLCSwNie4vQehNFZuSuWtWWxeAdcp/6aXWkG3qcSej+NKjpaEsCE6ZJsnfJb:NQJFLxwQQAdcp/6aXWkG3qcSej+NKjpc

Malware Config

Targets

    • Target

      sample

    • Size

      77KB

    • MD5

      6ab6e4a228d18e310ffc356dbbfd30de

    • SHA1

      ba26c210424198713f396939c91540812f218400

    • SHA256

      29c5f81b44a52d5a4978397351ec6d75e0f7f9644c01929ce3fa6d95a92b3317

    • SHA512

      d4951a105566937dd2aeae19515f04d53994f876a74498bee4166e2fa02a3ddb5828dc55a482270a1d4b420893cf9de5b22d98419fe512426887e1ca5571778e

    • SSDEEP

      1536:i6QJFLCSwNie4vQehNFZuSuWtWWxeAdcp/6aXWkG3qcSej+NKjpaEsCE6ZJsnfJb:NQJFLxwQQAdcp/6aXWkG3qcSej+NKjpc

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks