General

  • Target

    IdkWhatsGoingOn.exe

  • Size

    5.7MB

  • Sample

    241122-vspsxazrcn

  • MD5

    68a8d7bdb7daeee5d2bf27bf36092794

  • SHA1

    4db786dc2fd0506e7123b43ad8f2b7820b01bbad

  • SHA256

    4231822a26de5053ef9413968c254f8f4e6b4b345a7ccf4689b3d00ee879c3ab

  • SHA512

    878dcf38473b159c6d4d866a9bfa8cce38da070efa4e157c4a34d378e952fd26b9a1e76aeb0c117b11574af7916e56bbf6ca0156bac0e075da397439b297dc47

  • SSDEEP

    98304:w3dhPozxID/ISjmbE+4Q4prv2EiXXFGz/jWhG150OUvug1CJYE:MnHrlmnsv2nkzyhM50OUO

Malware Config

Targets

    • Target

      IdkWhatsGoingOn.exe

    • Size

      5.7MB

    • MD5

      68a8d7bdb7daeee5d2bf27bf36092794

    • SHA1

      4db786dc2fd0506e7123b43ad8f2b7820b01bbad

    • SHA256

      4231822a26de5053ef9413968c254f8f4e6b4b345a7ccf4689b3d00ee879c3ab

    • SHA512

      878dcf38473b159c6d4d866a9bfa8cce38da070efa4e157c4a34d378e952fd26b9a1e76aeb0c117b11574af7916e56bbf6ca0156bac0e075da397439b297dc47

    • SSDEEP

      98304:w3dhPozxID/ISjmbE+4Q4prv2EiXXFGz/jWhG150OUvug1CJYE:MnHrlmnsv2nkzyhM50OUO

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks