General

  • Target

    elon musk.pptx

  • Size

    1.1MB

  • Sample

    250127-qd6ewszlfw

  • MD5

    2b584370a2fb4970ae70e12a4bbaf685

  • SHA1

    d57991ccd3acdd025dde7c7f066abcba50a34b87

  • SHA256

    953ef8267dde192e9243306a8aab57c4779cdfba779ea0ef4185a5984f50111d

  • SHA512

    e16d19dbad5256cacd3b696ee1b001e9b01359fc91a151500d98f0a8e3df91a003ea13e6d1bff80bab409f56b8e5acd5ec115ed524106016654b4a3679cd1eaa

  • SSDEEP

    24576:Tk2WTsZasyuJiyV0mDUoHLgwPjvXS96H828hKlYvIQ5tNDwg//3Jc1h+NJkN5:TkKYlO3BpPTic8nwOPJwg//4+bkn

Malware Config

Targets

    • Target

      elon musk.pptx

    • Size

      1.1MB

    • MD5

      2b584370a2fb4970ae70e12a4bbaf685

    • SHA1

      d57991ccd3acdd025dde7c7f066abcba50a34b87

    • SHA256

      953ef8267dde192e9243306a8aab57c4779cdfba779ea0ef4185a5984f50111d

    • SHA512

      e16d19dbad5256cacd3b696ee1b001e9b01359fc91a151500d98f0a8e3df91a003ea13e6d1bff80bab409f56b8e5acd5ec115ed524106016654b4a3679cd1eaa

    • SSDEEP

      24576:Tk2WTsZasyuJiyV0mDUoHLgwPjvXS96H828hKlYvIQ5tNDwg//3Jc1h+NJkN5:TkKYlO3BpPTic8nwOPJwg//4+bkn

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand MICROSOFT.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks