General
-
Target
MuMuInstaller_1.5.0.6_overseas-v2.7.19.0x64_all_1678362949.exe
-
Size
5.0MB
-
Sample
241005-ghy2yashqf
-
MD5
de43ae2850234f6c7370e1c4c07c9057
-
SHA1
4b5a3b9b6b9bce5934c5a93e262b608351f712c1
-
SHA256
c986899b0af74464928749947c6e8b64f3eeb8fbd7dac666ce0e305d5a2eede9
-
SHA512
f391e8144ed8f661f612ad000d658f6561bf68f4b14da4f3d4c34b15437aaf19514fae0d3786462058dcc1c533ee3ba751520ad5fd7aa13bed9df272713ddd4c
-
SSDEEP
98304:UeaSaARtMoyxpyzFInGsMZB1FVNtTuF3xhu3qNIsc02vDRZTEg:RaqlyezFInGsEVNW3x83qysc02vVZog
Static task
static1
Behavioral task
behavioral1
Sample
MuMuInstaller_1.5.0.6_overseas-v2.7.19.0x64_all_1678362949.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
MuMuInstaller_1.5.0.6_overseas-v2.7.19.0x64_all_1678362949.exe
-
Size
5.0MB
-
MD5
de43ae2850234f6c7370e1c4c07c9057
-
SHA1
4b5a3b9b6b9bce5934c5a93e262b608351f712c1
-
SHA256
c986899b0af74464928749947c6e8b64f3eeb8fbd7dac666ce0e305d5a2eede9
-
SHA512
f391e8144ed8f661f612ad000d658f6561bf68f4b14da4f3d4c34b15437aaf19514fae0d3786462058dcc1c533ee3ba751520ad5fd7aa13bed9df272713ddd4c
-
SSDEEP
98304:UeaSaARtMoyxpyzFInGsMZB1FVNtTuF3xhu3qNIsc02vDRZTEg:RaqlyezFInGsEVNW3x83qysc02vVZog
-
Creates new service(s)
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1