Resubmissions
03/10/2024, 16:38
241003-t5jxrayerh 803/10/2024, 16:21
241003-ttmjhavbrm 803/10/2024, 16:19
241003-tsv49ayala 503/10/2024, 16:16
241003-tq1xqaxhmb 803/10/2024, 16:13
241003-tpan5sxgna 803/10/2024, 16:11
241003-tm529sthlj 303/10/2024, 15:53
241003-tbt6matcnk 803/10/2024, 15:45
241003-s7ev5stamn 303/10/2024, 15:32
241003-sytypswdkd 8General
-
Target
https://www.google.com
-
Sample
241003-t5jxrayerh
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
https://www.google.com
Score8/10-
Downloads MZ/PE file
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1