General

  • Target

    Outer.Wilds.Mod.Manager_0.14.2_x64_en-US.msi

  • Size

    4.1MB

  • Sample

    241020-25yd5sxdrq

  • MD5

    c92b22cf8829efb10088b314277fa1af

  • SHA1

    1dbc27bb993ced2ef76e3ed57723711fdcde0df7

  • SHA256

    03de03dc37dd52830dc3b7fbf4effe624a772b00d7b8b719ee3ae49920581cee

  • SHA512

    34cff15e94ef7325bbfd29f5de296861a60cbabc8607b19debdaafa8218c2230d28cd99ea4efaf69c49faf0c402841a2a054888b7d5d558ab0d44d451f604e97

  • SSDEEP

    98304:v3zDWw4hrh62Q6Gyug3Vhgd7yBi3+EKRUzzY9ax+EqZv8m:v3O/rhPQTyugl+dW2z5Z

Malware Config

Targets

    • Target

      Outer.Wilds.Mod.Manager_0.14.2_x64_en-US.msi

    • Size

      4.1MB

    • MD5

      c92b22cf8829efb10088b314277fa1af

    • SHA1

      1dbc27bb993ced2ef76e3ed57723711fdcde0df7

    • SHA256

      03de03dc37dd52830dc3b7fbf4effe624a772b00d7b8b719ee3ae49920581cee

    • SHA512

      34cff15e94ef7325bbfd29f5de296861a60cbabc8607b19debdaafa8218c2230d28cd99ea4efaf69c49faf0c402841a2a054888b7d5d558ab0d44d451f604e97

    • SSDEEP

      98304:v3zDWw4hrh62Q6Gyug3Vhgd7yBi3+EKRUzzY9ax+EqZv8m:v3O/rhPQTyugl+dW2z5Z

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks