General
-
Target
sample
-
Size
18KB
-
Sample
241120-xqcfxawlhp
-
MD5
eb13fcb8e05c49d2125a5d253d88c87d
-
SHA1
db5ba1b0b0c111c9946666f800bbd83d1cd20c95
-
SHA256
961c58e8acfb2e8e79defdc4bca76cca7a1b35093cff40de257c0ad936ccd7c4
-
SHA512
e562afa3f750e517ab9651d5e52a3c0c6948e3f38d63eb6e5e308060503d7e404bb598e621846ccd205283e1df473e5c0f76fcfa4724e8b577824c22406d0a2f
-
SSDEEP
384:wjn1ocy4OoJ4lbGa/MvhpNFgDR9CRlObz6r0sZuL2fN1xCejiw:wjn1ocy4OoCEaEJpNKDJbz6r0sZuLULn
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
sample
-
Size
18KB
-
MD5
eb13fcb8e05c49d2125a5d253d88c87d
-
SHA1
db5ba1b0b0c111c9946666f800bbd83d1cd20c95
-
SHA256
961c58e8acfb2e8e79defdc4bca76cca7a1b35093cff40de257c0ad936ccd7c4
-
SHA512
e562afa3f750e517ab9651d5e52a3c0c6948e3f38d63eb6e5e308060503d7e404bb598e621846ccd205283e1df473e5c0f76fcfa4724e8b577824c22406d0a2f
-
SSDEEP
384:wjn1ocy4OoJ4lbGa/MvhpNFgDR9CRlObz6r0sZuL2fN1xCejiw:wjn1ocy4OoCEaEJpNKDJbz6r0sZuLULn
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
6Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1