General
-
Target
speedymaqing3.exe
-
Size
107.3MB
-
Sample
241221-sn8dca1rbv
-
MD5
66e0da55b467ed157b71ec2b82a52674
-
SHA1
7748935234824cf103e8de75a430650efd9c8d91
-
SHA256
dea8d500bf52dd20eafb876893b1e7c724d352b68a0187ae799479b1a437512a
-
SHA512
4374f968c41712b12c74659cdcc338d4b384ef469c3a907882170b0b4f72c432697771d18fd550e63967d80a327e1bc93cac13520e16b3491eb65c67a13ca1a6
-
SSDEEP
1572864:L93gZcXiI2pNs61VHDVTrIKr2aBC8y0SgjjuKbixiAvZRq+w9KMr759dBO://2s6LjVHPHSgRsiAvZk+w9KM359dA
Behavioral task
behavioral1
Sample
speedymaqing3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
speedymaqing3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
speedymaqing3.exe
-
Size
107.3MB
-
MD5
66e0da55b467ed157b71ec2b82a52674
-
SHA1
7748935234824cf103e8de75a430650efd9c8d91
-
SHA256
dea8d500bf52dd20eafb876893b1e7c724d352b68a0187ae799479b1a437512a
-
SHA512
4374f968c41712b12c74659cdcc338d4b384ef469c3a907882170b0b4f72c432697771d18fd550e63967d80a327e1bc93cac13520e16b3491eb65c67a13ca1a6
-
SSDEEP
1572864:L93gZcXiI2pNs61VHDVTrIKr2aBC8y0SgjjuKbixiAvZRq+w9KMr759dBO://2s6LjVHPHSgRsiAvZk+w9KM359dA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
2Safe Mode Boot
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1