General

  • Target

    WINDOWS.bat

  • Size

    73B

  • Sample

    241002-3mwm9sshrp

  • MD5

    0be378f1e4eab848acb86fc2ef0fa5c4

  • SHA1

    8b8f96684bd6990289823a54ece10fe0e7bdade7

  • SHA256

    6688a6d3a177f5c648d7a809ac1875a8c33e6ffdab10d0bf513d5fd3ba6f15f2

  • SHA512

    83a1cc58d00d6faac9dfe60638267f34612096b85dc280ef374aa7e60ee6595ea585d219b22a6540445a1ed45ac79a6bf3739a0485bdcf4914ddf0aa494dacc1

Malware Config

Targets

    • Target

      WINDOWS.bat

    • Size

      73B

    • MD5

      0be378f1e4eab848acb86fc2ef0fa5c4

    • SHA1

      8b8f96684bd6990289823a54ece10fe0e7bdade7

    • SHA256

      6688a6d3a177f5c648d7a809ac1875a8c33e6ffdab10d0bf513d5fd3ba6f15f2

    • SHA512

      83a1cc58d00d6faac9dfe60638267f34612096b85dc280ef374aa7e60ee6595ea585d219b22a6540445a1ed45ac79a6bf3739a0485bdcf4914ddf0aa494dacc1

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks