Resubmissions

15-02-2025 04:47

250215-fep47avpfs 8

15-02-2025 00:27

250215-ar7bca1pgp 8

14-02-2025 22:26

250214-2cxbdaznem 8

14-02-2025 22:26

250214-2clvmszndp 8

14-02-2025 22:24

250214-2bvfdsznbp 8

14-02-2025 22:24

250214-2bdgwaznap 8

14-02-2025 22:17

250214-17tnaszqdw 8

14-02-2025 01:43

250214-b5drmaylcm 8

14-02-2025 01:41

250214-b38h8ayqfs 8

14-02-2025 01:37

250214-b1s1rayqc1 4

General

  • Target

    http://noescape.exe

  • Sample

    250215-fep47avpfs

Malware Config

Targets

    • Target

      http://noescape.exe

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks