General

  • Target

    4. Exploited; setting boundaries and getting help Y10 (1).pptx

  • Size

    169.7MB

  • Sample

    250124-kfcyga1jgk

  • MD5

    62911683f5d3dd161fbd98cbb9fad4a5

  • SHA1

    9f3b276dbe4de06e50f67785679b6ae6fc854069

  • SHA256

    b2f036d7fe74586b0194ea6b4c83fd98b728626a4f7995fd4e5069ba6c1b35a5

  • SHA512

    c29e6053693bfe4dd9fc6bf01af5f8c4294a69b8a4f133d0188f3e5a338b22034a7c741e9af937c7be540b77ce1f7cfd7962d39e6d9cb52892016506578e09a7

  • SSDEEP

    3145728:qzHImWDjD48RhBLjYetbJZAHXlQBE5Jgam38vROyoMW0otTs79W69S71p29i:c5ejDfRhBfY+bPAHXlQGvg3xdMW0oxsy

Malware Config

Targets

    • Target

      4. Exploited; setting boundaries and getting help Y10 (1).pptx

    • Size

      169.7MB

    • MD5

      62911683f5d3dd161fbd98cbb9fad4a5

    • SHA1

      9f3b276dbe4de06e50f67785679b6ae6fc854069

    • SHA256

      b2f036d7fe74586b0194ea6b4c83fd98b728626a4f7995fd4e5069ba6c1b35a5

    • SHA512

      c29e6053693bfe4dd9fc6bf01af5f8c4294a69b8a4f133d0188f3e5a338b22034a7c741e9af937c7be540b77ce1f7cfd7962d39e6d9cb52892016506578e09a7

    • SSDEEP

      3145728:qzHImWDjD48RhBLjYetbJZAHXlQBE5Jgam38vROyoMW0otTs79W69S71p29i:c5ejDfRhBfY+bPAHXlQGvg3xdMW0oxsy

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand STEAM.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks