General

  • Target

    lp

  • Size

    3KB

  • Sample

    241110-1wb9wawgmd

  • MD5

    878c2e3784f992b7bbfaf0ddf484f6c2

  • SHA1

    5fc23376d19b9d4ddb0f395baae5fedf89a976a5

  • SHA256

    a5f65dba9f803729ece14ca1e67ca989e24f61669bd35a4cc0b938104d9bf0b3

  • SHA512

    470109e34d88b3575ed0ca23a6a20692c9e12bf490b9e76c6fcf6936cfe3e19e3e4b0c2f8a0d564be54a322913f6301d1cf7cbdf8c4429d0c74211a5c2693f2d

Malware Config

Targets

    • Target

      lp

    • Size

      3KB

    • MD5

      878c2e3784f992b7bbfaf0ddf484f6c2

    • SHA1

      5fc23376d19b9d4ddb0f395baae5fedf89a976a5

    • SHA256

      a5f65dba9f803729ece14ca1e67ca989e24f61669bd35a4cc0b938104d9bf0b3

    • SHA512

      470109e34d88b3575ed0ca23a6a20692c9e12bf490b9e76c6fcf6936cfe3e19e3e4b0c2f8a0d564be54a322913f6301d1cf7cbdf8c4429d0c74211a5c2693f2d

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks