Resubmissions

02/04/2025, 19:18

250402-x1fajsvmt9 10

22/03/2025, 04:45

250322-fdd1jaxzax 10

22/03/2025, 04:32

250322-e5x22sxydw 10

22/03/2025, 01:50

250322-b9qa8ayrs5 10

General

  • Target

    chrome.exe

  • Size

    4.1MB

  • Sample

    250402-x1fajsvmt9

  • MD5

    d162022a4f77fe568e3644c8ddccfc91

  • SHA1

    940b43d35e0bd31d108b5758339494e1b990ac21

  • SHA256

    780044208370ddc653095749d6e17ba029364d169891c8fcf2ff10974e0800ab

  • SHA512

    81db20a0cf1ba119769a86b1c24a1106a2a13c0dd4c42285128cd506c385e596466f5bafae196ec22187fbd729eb5167295b6d9850d04d92c1c67540bba8573e

  • SSDEEP

    98304:bhmbefkYYSmghDECMUVXhxEt3/PGrcFEXdA+Sif2g07:bf8YbmGlhVmv+r1XyNi+g07

Malware Config

Targets

    • Target

      chrome.exe

    • Size

      4.1MB

    • MD5

      d162022a4f77fe568e3644c8ddccfc91

    • SHA1

      940b43d35e0bd31d108b5758339494e1b990ac21

    • SHA256

      780044208370ddc653095749d6e17ba029364d169891c8fcf2ff10974e0800ab

    • SHA512

      81db20a0cf1ba119769a86b1c24a1106a2a13c0dd4c42285128cd506c385e596466f5bafae196ec22187fbd729eb5167295b6d9850d04d92c1c67540bba8573e

    • SSDEEP

      98304:bhmbefkYYSmghDECMUVXhxEt3/PGrcFEXdA+Sif2g07:bf8YbmGlhVmv+r1XyNi+g07

    • Disables service(s)

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Modifies security service

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks