General

  • Target

    w10.exe

  • Size

    153KB

  • Sample

    250120-k3wdbsskdj

  • MD5

    987d8991d5f2bde73d7e33fb5cc12655

  • SHA1

    e5e56a602d7a9a90a75c1a841948f0e10b8144fb

  • SHA256

    926369b540e2f133c41d26e5ae36cc36572514e6c376b83dc6a8a676c081a318

  • SHA512

    94dfb389930d8e7ccb3d791e5df49805becea6a8647199bcb4dfa62f0f0375d01e5f3ecba8b5bf019782a62a71487a5b86f15f933cb22cbedf3cc7ad1bfbbc28

  • SSDEEP

    1536:ZyGpGCbYh23MdKDw5+fkVLu2+BsEOJobqUUk6Q9fmU1shr7v80lDeqUUj6R9fmUG:8GpwnGsExWUf6zVDtUU6qVQyn

Malware Config

Targets

    • Target

      w10.exe

    • Size

      153KB

    • MD5

      987d8991d5f2bde73d7e33fb5cc12655

    • SHA1

      e5e56a602d7a9a90a75c1a841948f0e10b8144fb

    • SHA256

      926369b540e2f133c41d26e5ae36cc36572514e6c376b83dc6a8a676c081a318

    • SHA512

      94dfb389930d8e7ccb3d791e5df49805becea6a8647199bcb4dfa62f0f0375d01e5f3ecba8b5bf019782a62a71487a5b86f15f933cb22cbedf3cc7ad1bfbbc28

    • SSDEEP

      1536:ZyGpGCbYh23MdKDw5+fkVLu2+BsEOJobqUUk6Q9fmU1shr7v80lDeqUUj6R9fmUG:8GpwnGsExWUf6zVDtUU6qVQyn

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender notification settings

    • Modifies security service

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks