General
-
Target
https://cdn.discordapp.com/attachments/1270716953182343241/1286388419261632624/10k_tweaks.bat?ex=66ef0b93&is=66edba13&hm=7360fa8b8d6b66133e1bc789d504f5f37d82f69fa10ae1dd4fd238ca2d8115da&
-
Sample
240920-xprt7ssenc
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1270716953182343241/1286388419261632624/10k_tweaks.bat?ex=66ef0b93&is=66edba13&hm=7360fa8b8d6b66133e1bc789d504f5f37d82f69fa10ae1dd4fd238ca2d8115da&
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1270716953182343241/1286388419261632624/10k_tweaks.bat?ex=66ef0b93&is=66edba13&hm=7360fa8b8d6b66133e1bc789d504f5f37d82f69fa10ae1dd4fd238ca2d8115da&
-
Modifies security service
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
7