Resubmissions

15-10-2024 12:09

241015-pbyrlatbna 8

15-10-2024 12:06

241015-n98tsatapf 3

15-10-2024 11:58

241015-n5mqrasgnb 10

General

  • Target

    TLauncher.exe

  • Size

    8.9MB

  • Sample

    241015-pbyrlatbna

  • MD5

    505731086d2f448e68c025a7003efe00

  • SHA1

    e8358cf87df55712a7b6998d1816e94b57f3b7c1

  • SHA256

    978dfe8f0fbb57398366e2302055b58fa641258f53db6909fca2b5a1e87ff3c5

  • SHA512

    856ad2f0caa72c15b20831c7e1d8917329907381e1e95ce470ff3592755804cc17cd507c105d49fdecbc418a2c3f2b01e1be2ce15dc981aeb7f39ce2889cb4d4

  • SSDEEP

    196608:vRAQAHQHWFm5kAiFWnuf6J/+Ift24xJN+vwvasDU6sU0s:LUn6nDJ/+v4xJprUB4

Malware Config

Targets

    • Target

      TLauncher.exe

    • Size

      8.9MB

    • MD5

      505731086d2f448e68c025a7003efe00

    • SHA1

      e8358cf87df55712a7b6998d1816e94b57f3b7c1

    • SHA256

      978dfe8f0fbb57398366e2302055b58fa641258f53db6909fca2b5a1e87ff3c5

    • SHA512

      856ad2f0caa72c15b20831c7e1d8917329907381e1e95ce470ff3592755804cc17cd507c105d49fdecbc418a2c3f2b01e1be2ce15dc981aeb7f39ce2889cb4d4

    • SSDEEP

      196608:vRAQAHQHWFm5kAiFWnuf6J/+Ift24xJN+vwvasDU6sU0s:LUn6nDJ/+v4xJprUB4

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks