General
-
Target
drfone_setup_full3824.exe
-
Size
2.4MB
-
Sample
241005-dcxedavhnh
-
MD5
d083de3cd489927464db90cebf1a6e59
-
SHA1
ee2b6ec10a5eeebc882302c4976d6edbc427b274
-
SHA256
580a232eb87da0f8536e3e267318eb3d99ded46fe61631408b091cd497c60b42
-
SHA512
89a31707b86804adc02bec5a36c277610d88862634325b0c9c2072d95dbe57491a4ef7b16b2c187fcb284831f969877ffd53253951d89c581af1ea1c48743970
-
SSDEEP
49152:IvSzkJnOyQpABa+VsNbwzPhTzoL6Y0fxfNrBhf0uzkf+:Iqzkbkbhwz2Lb0fxfNrJ
Static task
static1
Behavioral task
behavioral1
Sample
drfone_setup_full3824.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
drfone_setup_full3824.exe
-
Size
2.4MB
-
MD5
d083de3cd489927464db90cebf1a6e59
-
SHA1
ee2b6ec10a5eeebc882302c4976d6edbc427b274
-
SHA256
580a232eb87da0f8536e3e267318eb3d99ded46fe61631408b091cd497c60b42
-
SHA512
89a31707b86804adc02bec5a36c277610d88862634325b0c9c2072d95dbe57491a4ef7b16b2c187fcb284831f969877ffd53253951d89c581af1ea1c48743970
-
SSDEEP
49152:IvSzkJnOyQpABa+VsNbwzPhTzoL6Y0fxfNrBhf0uzkf+:Iqzkbkbhwz2Lb0fxfNrJ
-
Modifies firewall policy service
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies Windows Firewall
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
2Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1