Resubmissions

23-08-2024 20:52

240823-znppkawalc 10

23-08-2024 11:05

240823-m66dtasgqk 10

22-08-2024 19:52

240822-yllpfsxdrj 10

General

  • Target

    MBSetup.exe

  • Size

    2.5MB

  • Sample

    240823-znppkawalc

  • MD5

    d21bf3852bb27fb6f5459d2cf2bcd51c

  • SHA1

    e59309bbe58c9584517e4bb50ff499dffb29d7b0

  • SHA256

    de9c4e8b4b0c756eee4e39221c1e4e0e11c2e67effb828e27de3c4b4470ccff2

  • SHA512

    17bc7740f131a1d4e84fd7e4ab5e1ce510660f5046340ef6d09ef99c56c88da2b6be3ae5c5ddb7213841c506eaec147c65abba1a7a2a8eb4fb8f6329bbaa03d1

  • SSDEEP

    49152:FMofPlPU+QG/rOVcVz6StQyfvE0Z3R0nxiIq2dsTDwfw1Y:FMslc+QGjuTKtQRq261Y

Malware Config

Targets

    • Target

      MBSetup.exe

    • Size

      2.5MB

    • MD5

      d21bf3852bb27fb6f5459d2cf2bcd51c

    • SHA1

      e59309bbe58c9584517e4bb50ff499dffb29d7b0

    • SHA256

      de9c4e8b4b0c756eee4e39221c1e4e0e11c2e67effb828e27de3c4b4470ccff2

    • SHA512

      17bc7740f131a1d4e84fd7e4ab5e1ce510660f5046340ef6d09ef99c56c88da2b6be3ae5c5ddb7213841c506eaec147c65abba1a7a2a8eb4fb8f6329bbaa03d1

    • SSDEEP

      49152:FMofPlPU+QG/rOVcVz6StQyfvE0Z3R0nxiIq2dsTDwfw1Y:FMslc+QGjuTKtQRq261Y

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops file in Drivers directory

    • Modifies RDP port number used by Windows

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Impair Defenses: Safe Mode Boot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Boot or Logon Autostart Execution: Authentication Package

      Suspicious Windows Authentication Registry Modification.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Modifies WinLogon for persistence

MITRE ATT&CK Enterprise v15

Tasks