General

  • Target

    sas.bat

  • Size

    49KB

  • Sample

    241005-br7gsaxdjp

  • MD5

    1ef62d322c2d218a93ec6c38ce4e609a

  • SHA1

    7c7fa81ca21efc7f0869ae814d359fd1aba6408e

  • SHA256

    c965477108ff902b5c5ca176b3747f2258401616e6aeb92d576e47b6d41f415b

  • SHA512

    b321c1422349d6d900af22bbbff70afeec2f6237396969129326bbc62654984789621270e21fd156cd82bcc2093636c43c6cd146f4825386c6b5458215ce2597

  • SSDEEP

    768:2E29js/DMExuHiJFamOBdBJtcAzsVd9YKfvPvwcmgJLFfLM8Zn9clSv8xk+nDvZb:2E29js/DMExuHiJFa7BrcAj0XIjPx

Malware Config

Targets

    • Target

      sas.bat

    • Size

      49KB

    • MD5

      1ef62d322c2d218a93ec6c38ce4e609a

    • SHA1

      7c7fa81ca21efc7f0869ae814d359fd1aba6408e

    • SHA256

      c965477108ff902b5c5ca176b3747f2258401616e6aeb92d576e47b6d41f415b

    • SHA512

      b321c1422349d6d900af22bbbff70afeec2f6237396969129326bbc62654984789621270e21fd156cd82bcc2093636c43c6cd146f4825386c6b5458215ce2597

    • SSDEEP

      768:2E29js/DMExuHiJFamOBdBJtcAzsVd9YKfvPvwcmgJLFfLM8Zn9clSv8xk+nDvZb:2E29js/DMExuHiJFa7BrcAj0XIjPx

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Blocklisted process makes network request

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Modifies Windows Firewall

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks