Resubmissions

10-02-2025 21:46

250210-1mnljszkbx 8

10-02-2025 14:17

250210-rlv5kavmfs 10

09-02-2025 00:38

250209-azdzrsyrdy 8

08-02-2025 03:36

250208-d5zp7ssraw 1

08-02-2025 03:21

250208-dwdrdatmck 1

08-02-2025 01:29

250208-bwdehaxqe1 7

08-02-2025 00:52

250208-a8cs3axncm 3

07-02-2025 23:16

250207-29ms7stqdj 9

07-02-2025 23:06

250207-23n3patnbr 8

07-02-2025 20:22

250207-y5x7laxlgq 7

General

  • Target

    http://noescape.exe

  • Sample

    250210-1mnljszkbx

Malware Config

Targets

    • Target

      http://noescape.exe

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks