Resubmissions
13-12-2024 13:42
241213-qzv62szngy 1012-12-2024 18:20
241212-wytvgssnay 812-12-2024 17:47
241212-wcwrys1qg1 712-12-2024 17:04
241212-vldr3aspck 812-12-2024 16:25
241212-txbw6szkhx 811-12-2024 19:44
241211-yfvp6swkhv 809-12-2024 19:12
241209-xwm5laxpbt 809-12-2024 17:25
241209-vzfhtavngv 309-12-2024 13:30
241209-qsbh3atnfp 308-12-2024 20:49
241208-zl1n2stqas 8General
-
Target
https://158.69.36.15/files/estrouvinhar.js
-
Sample
241212-txbw6szkhx
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://158.69.36.15/files/estrouvinhar.js
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
https://158.69.36.15/files/estrouvinhar.js
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
A potential corporate email address has been identified in the URL: 5CSSS08123F5245AEE00A490D45@AdobeOrg
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1