General
-
Target
PROD_Start_DriverPack.hta
-
Size
1KB
-
Sample
240921-akcs6awejl
-
MD5
dda846a4704efc2a03e1f8392e6f1ffc
-
SHA1
387171a06eee5a76aaedc3664385bb89703cf6df
-
SHA256
e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25
-
SHA512
5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a
Static task
static1
Behavioral task
behavioral1
Sample
PROD_Start_DriverPack.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PROD_Start_DriverPack.hta
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://dwrapper-prod.herokuapp.com/bin/watcher.html
Targets
-
-
Target
PROD_Start_DriverPack.hta
-
Size
1KB
-
MD5
dda846a4704efc2a03e1f8392e6f1ffc
-
SHA1
387171a06eee5a76aaedc3664385bb89703cf6df
-
SHA256
e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25
-
SHA512
5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a
-
Blocklisted process makes network request
-
Download via BitsAdmin
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1BITS Jobs
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1