General

  • Target

    Store-ind-10002.exe

  • Size

    181.6MB

  • Sample

    241120-wmgqsa1emj

  • MD5

    aa6c0f982ef38147d29a062f655c79e8

  • SHA1

    3a7f6c67a3f292b17d047397cc6cae663758fb05

  • SHA256

    727a20a3caeb6ba869ea392ebd7b29496fbc08f019b56ed959e48b903e6e14c6

  • SHA512

    edf363155623e10697021b9d191d921d423026be1f537c47de879e97c76bb6b6644af41cdb87af0f6b3cfe0edb186ab056a0e20737220aed789ebb5dfcd8ddbb

  • SSDEEP

    3145728:NkuGirATd5XXMWrjwCMS3JXJVhfSEx/aJjdsw7KwM8JiWb4URJE00cfAAerKzUOJ:airAj5Hwu3JThfhx/aVzo8AKfAAX/M2X

Malware Config

Targets

    • Target

      Store-ind-10002.exe

    • Size

      181.6MB

    • MD5

      aa6c0f982ef38147d29a062f655c79e8

    • SHA1

      3a7f6c67a3f292b17d047397cc6cae663758fb05

    • SHA256

      727a20a3caeb6ba869ea392ebd7b29496fbc08f019b56ed959e48b903e6e14c6

    • SHA512

      edf363155623e10697021b9d191d921d423026be1f537c47de879e97c76bb6b6644af41cdb87af0f6b3cfe0edb186ab056a0e20737220aed789ebb5dfcd8ddbb

    • SSDEEP

      3145728:NkuGirATd5XXMWrjwCMS3JXJVhfSEx/aJjdsw7KwM8JiWb4URJE00cfAAerKzUOJ:airAj5Hwu3JThfhx/aVzo8AKfAAX/M2X

    • UAC bypass

    • Drops file in Drivers directory

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks