Resubmissions
13-12-2024 13:42
241213-qzv62szngy 1012-12-2024 18:20
241212-wytvgssnay 812-12-2024 17:47
241212-wcwrys1qg1 712-12-2024 17:04
241212-vldr3aspck 812-12-2024 16:25
241212-txbw6szkhx 811-12-2024 19:44
241211-yfvp6swkhv 809-12-2024 19:12
241209-xwm5laxpbt 809-12-2024 17:25
241209-vzfhtavngv 309-12-2024 13:30
241209-qsbh3atnfp 308-12-2024 20:49
241208-zl1n2stqas 8General
-
Target
https://158.69.36.15/files/estrouvinhar.js
-
Sample
241204-lrjqtsxkbl
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://158.69.36.15/files/estrouvinhar.js
Resource
win11-20241007-en
Malware Config
Extracted
https://3105.filemail.com/api/file/get?filekey=tZ0A8AkaCfHVyJQGBGtNyLc0256wc-f0oI-T-w6PIjdTYIYQJd8Mux_T_T5g9jEmfO3a&skipreg=true&pk_vid=e0109638c9bfb9571732531514b5ff7c
https://3105.filemail.com/api/file/get?filekey=tZ0A8AkaCfHVyJQGBGtNyLc0256wc-f0oI-T-w6PIjdTYIYQJd8Mux_T_T5g9jEmfO3a&skipreg=true&pk_vid=e0109638c9bfb9571732531514b5ff7c
Targets
-
-
Target
https://158.69.36.15/files/estrouvinhar.js
-
Blocklisted process makes network request
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
3Process Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1