Resubmissions

16-11-2024 19:57

241116-ypgvnssgkg 3

16-11-2024 18:07

241116-wqpwka1dla 9

General

  • Target

    Spoofer.exe

  • Size

    15.6MB

  • Sample

    241116-wqpwka1dla

  • MD5

    614edbe5e53c67f6b09edaa1ad35a169

  • SHA1

    5871a459ecbecf2bb6ee230351ded50f716571d5

  • SHA256

    f888b7ae01e536121eb963e88e59c9da704d647e782c8ba4445c34ad85fd81ec

  • SHA512

    89db30d0f6b467c02585c185772e1e37aad06181958e4fa77f39918576b87df480b698600f7061587a4bd5d8b52d922f491350c93e58373b6e35e9c5e0dd4002

  • SSDEEP

    393216:O124s7cFOzPkLUMvstfS0sAwEolzmL00vP:O98cAzoytdBwtlKL3H

Malware Config

Targets

    • Target

      Spoofer.exe

    • Size

      15.6MB

    • MD5

      614edbe5e53c67f6b09edaa1ad35a169

    • SHA1

      5871a459ecbecf2bb6ee230351ded50f716571d5

    • SHA256

      f888b7ae01e536121eb963e88e59c9da704d647e782c8ba4445c34ad85fd81ec

    • SHA512

      89db30d0f6b467c02585c185772e1e37aad06181958e4fa77f39918576b87df480b698600f7061587a4bd5d8b52d922f491350c93e58373b6e35e9c5e0dd4002

    • SSDEEP

      393216:O124s7cFOzPkLUMvstfS0sAwEolzmL00vP:O98cAzoytdBwtlKL3H

    • Modifies boot configuration data using bcdedit

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks