General
-
Target
PassatHook.exe
-
Size
14.7MB
-
Sample
250328-ygeeksslv2
-
MD5
eafb67ed7734f5561c709b64e6e36b8f
-
SHA1
d7d5859993759ef0079a92506a9eed6a11fbdf48
-
SHA256
1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3
-
SHA512
f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692
-
SSDEEP
393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf
Static task
static1
Behavioral task
behavioral1
Sample
PassatHook.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PassatHook.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
PassatHook.exe
-
Size
14.7MB
-
MD5
eafb67ed7734f5561c709b64e6e36b8f
-
SHA1
d7d5859993759ef0079a92506a9eed6a11fbdf48
-
SHA256
1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3
-
SHA512
f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692
-
SSDEEP
393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf
-
Modifies WinLogon for persistence
-
UAC bypass
-
Disables RegEdit via registry modification
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Winlogon Helper DLL
2Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Winlogon Helper DLL
2Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5