Resubmissions

16-02-2025 22:14

250216-15v4cazqem 8

16-02-2025 21:47

250216-1njc8azkgn 8

16-02-2025 17:48

250216-wdm67stqdr 8

16-02-2025 17:30

250216-v3fyratnar 8

16-02-2025 17:12

250216-vq84rstkep 8

16-02-2025 02:26

250216-cwxzksxqbt 8

15-02-2025 04:47

250215-fep47avpfs 8

15-02-2025 00:27

250215-ar7bca1pgp 8

14-02-2025 22:26

250214-2cxbdaznem 8

14-02-2025 22:26

250214-2clvmszndp 8

General

  • Target

    http://noescape.exe

  • Sample

    250216-1njc8azkgn

Malware Config

Targets

    • Target

      http://noescape.exe

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks