Resubmissions

05-12-2024 18:59

241205-xnkz9sxlbt 5

05-12-2024 18:46

241205-xe5cjswrd1 10

General

  • Target

    Adil Windows test.bat

  • Size

    12KB

  • Sample

    241205-xe5cjswrd1

  • MD5

    de58ceaf3e15b74f37ded57ca6a4b3db

  • SHA1

    e1d566f0c71cd042c541a82cc0c2d5b734439429

  • SHA256

    d6b89a4217578b742d1efd9c717ede6a302492842ed7afbe7d4fc45f16e790a5

  • SHA512

    71c64af60a0180fb44dc53ef7bcf74ee3e29d30b6b0d4246bb8b9658be4bfe0fed2f153784dbf2ad93aaa459ca6b17e5c2324bbebb3b6e91ce2257ace5a0da64

  • SSDEEP

    192:A9AcZIbMED95MxPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA6IQbwreO7D89T1rKNfBu

Malware Config

Targets

    • Target

      Adil Windows test.bat

    • Size

      12KB

    • MD5

      de58ceaf3e15b74f37ded57ca6a4b3db

    • SHA1

      e1d566f0c71cd042c541a82cc0c2d5b734439429

    • SHA256

      d6b89a4217578b742d1efd9c717ede6a302492842ed7afbe7d4fc45f16e790a5

    • SHA512

      71c64af60a0180fb44dc53ef7bcf74ee3e29d30b6b0d4246bb8b9658be4bfe0fed2f153784dbf2ad93aaa459ca6b17e5c2324bbebb3b6e91ce2257ace5a0da64

    • SSDEEP

      192:A9AcZIbMED95MxPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA6IQbwreO7D89T1rKNfBu

    • Disables service(s)

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Modifies Windows Firewall

    • Stops running service(s)

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks