General

  • Target

    xyz4568.rar

  • Size

    446KB

  • Sample

    250209-chp2ta1qcw

  • MD5

    7209e82cdcd08153f44154f6d3410df0

  • SHA1

    1efbdd58981ab71b3f2ba21ce66e42b927c5e118

  • SHA256

    ee15fc4641362985d0214b9247d65eebc2203cef38ae9a85b2c3eab3f9f6d45a

  • SHA512

    5e79997581ea4e88c294f83289cff47e03abe462bd310b5ea5e59a487fab1e5cae881d38091f024804089d3a4d39e0294ac9c6c8588c5412a4b5a2ea684e3c2b

  • SSDEEP

    6144:fMT0R8QgeWLa+eVi0pIt28iPKB+Rusx8ok15lR0UY448EPQUJS+Yui1RUcRFZoT2:fn8yWSMa5vPrRh8D1v3Yt8iUGcN4cg8Z

Malware Config

Targets

    • Target

      xyz4568/dControl.exe

    • Size

      447KB

    • MD5

      58008524a6473bdf86c1040a9a9e39c3

    • SHA1

      cb704d2e8df80fd3500a5b817966dc262d80ddb8

    • SHA256

      1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326

    • SHA512

      8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31

    • SSDEEP

      6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies security service

    • Windows security bypass

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Windows security modification

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks