General
-
Target
New-EXE.zip
-
Size
171KB
-
Sample
241119-m4a5wswank
-
MD5
5540bc80b476c8510aa08bb07f9eab2a
-
SHA1
e24bfe8f6e2971fbe7721a979cd191faa995b548
-
SHA256
6b61a90ebc20baa1ee6ea5bc7c4b31c40531616c458b27d19511e4f57f5fbf67
-
SHA512
c1705f27addd9cb32940ee78d2b754a8866b220c05ba3dceb1d5869104d7a65bd5a2e0961703c22912b49496c0f95f100b911e3f00acf10e3294d7dcc8f3a551
-
SSDEEP
3072:HOA+8RMQAkdClTzvq1eW+k0UmiyH+ZmfCDTj1MMIbdPpiCjTz7j6:Nray1Z+kWcZ5T/IpRiCW
Static task
static1
Behavioral task
behavioral1
Sample
New-EXE/hardening-apply.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
New-EXE/hardening-apply.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New-EXE/hardening-restore.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New-EXE/hardening-restore.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
New-EXE/hardening-apply.exe
-
Size
144KB
-
MD5
7bbc288f509b422098217675c173aea1
-
SHA1
03e89432aaf277af64032952388ec932fc234490
-
SHA256
402b31c398f6497c5cfc24e9ddcda0239d9b8c688d2217f2c00260f5b1674e49
-
SHA512
dd431b210fddc6ccc641dfaa8ae2fe3fdcee670dac93be03fbedaa1e6053ac5a85cbc7540808c25906d179847e7fc713a269d67e5c24d1edc714fb2a2ce3cf4f
-
SSDEEP
3072:Ipvb7RV/8hhb3dLUK94IgqHniOSyaZoc7QNPnP9TBfWSCbXFwiepIO:o9VkhhrdYK94IgqHniOSyaZoc7QNPnPF
-
Blocklisted process makes network request
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Modifies powershell logging option
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
-
-
Target
New-EXE/hardening-restore.exe
-
Size
152KB
-
MD5
b265f35aa5b05e01b939a610166c83ee
-
SHA1
645e47cdc52481fbf267881bbf9626eca67c4696
-
SHA256
446e8d0ef0fab6b2182b6c4feea580cf6a43ea59bdac1ee364b380bb5d596ede
-
SHA512
a2e4c8aa4929c2c216b3c5225c5de9b8893a5b9e531f5979f1b5c01523eff364fc58367988e52a6db6a41ec77321513da665e2e474a5b199f24cb991df76c3d9
-
SSDEEP
3072:wpvb7RV/8hhb3dLUK94IgqHniOSyaZoc7QNPnP9TBfWSi3CjTz7dTu:Q9VkhhrdYK94IgqHniOSyaZoc7QNPnPK
-
Blocklisted process makes network request
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Modifies powershell logging option
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Query Registry
2System Information Discovery
3