General

  • Target

    a.docx

  • Size

    15KB

  • Sample

    241207-vjld5axjhv

  • MD5

    1d6977b6e20a6e468656f41de3a58fd1

  • SHA1

    43fbd0a31a3bf0cb76ca39db7336a5a8a67fc893

  • SHA256

    ac5fe5e22f945fd00f026053d8165a3c53f131de6cd1efebc010e1bb0ae6a9c1

  • SHA512

    d5fb32a4cd14178f5641876e29d33820df652e3e70b413888c8c454029e7323e42e4e084e00d1c9d50fda226583610d8b8d37b367364d74d5ceac227ec61b599

  • SSDEEP

    384:f0ypWdGhwRz8G0WRz8G0sRz8G0HGhxGhLtwC78q1AF7ZRGY/BDoJBEBTnu:PsGKRz8G0WRz8G0sRz8G0HGbGFx8qU7S

Malware Config

Targets

    • Target

      a.docx

    • Size

      15KB

    • MD5

      1d6977b6e20a6e468656f41de3a58fd1

    • SHA1

      43fbd0a31a3bf0cb76ca39db7336a5a8a67fc893

    • SHA256

      ac5fe5e22f945fd00f026053d8165a3c53f131de6cd1efebc010e1bb0ae6a9c1

    • SHA512

      d5fb32a4cd14178f5641876e29d33820df652e3e70b413888c8c454029e7323e42e4e084e00d1c9d50fda226583610d8b8d37b367364d74d5ceac227ec61b599

    • SSDEEP

      384:f0ypWdGhwRz8G0WRz8G0sRz8G0HGhxGhLtwC78q1AF7ZRGY/BDoJBEBTnu:PsGKRz8G0WRz8G0sRz8G0HGbGFx8qU7S

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks