Resubmissions

10/04/2025, 15:47

250410-s76nvswtgz 8

10/04/2025, 13:03

250410-qavh8asl12 8

General

  • Target

    Desktop.rar

  • Size

    45.7MB

  • Sample

    250410-s76nvswtgz

  • MD5

    8e63373e90766f517978814a5a4e367d

  • SHA1

    d5838de7eb03ba1e5521dcdee1382f2749885860

  • SHA256

    485d858572f7b2d02edc24b9d1186c06673a6452789e3aa166e45f86368a77cb

  • SHA512

    d445f8c815ba4c0d14ef11eeab63886aacdd9d90503760167fe964349c27dd3f2fbc45f3e8a26941eefecc7216177b6b2529dee4a4daf24a47aadaa157378a95

  • SSDEEP

    786432:6bklmNIhQsn58RlmlyLFeKCvtPHTkcafqObmb3r/wuaMz234C0w7v4Vj:6Alm/RQoLYKCVHTk5f1dK2Xv41

Malware Config

Targets

    • Target

      Desktop.rar

    • Size

      45.7MB

    • MD5

      8e63373e90766f517978814a5a4e367d

    • SHA1

      d5838de7eb03ba1e5521dcdee1382f2749885860

    • SHA256

      485d858572f7b2d02edc24b9d1186c06673a6452789e3aa166e45f86368a77cb

    • SHA512

      d445f8c815ba4c0d14ef11eeab63886aacdd9d90503760167fe964349c27dd3f2fbc45f3e8a26941eefecc7216177b6b2529dee4a4daf24a47aadaa157378a95

    • SSDEEP

      786432:6bklmNIhQsn58RlmlyLFeKCvtPHTkcafqObmb3r/wuaMz234C0w7v4Vj:6Alm/RQoLYKCVHTk5f1dK2Xv41

    • Downloads MZ/PE file

    • Modify Registry: Disable Windows Driver Blocklist

      Disable Windows Driver Blocklist via Registry.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks