Resubmissions

05/04/2025, 22:04

250405-1y8e4awvgy 8

05/04/2025, 21:57

250405-1t6eyawtg1 8

05/04/2025, 21:32

250405-1dvy9sykx2 8

05/04/2025, 21:28

250405-1bty7ayks4 8

05/04/2025, 21:15

250405-z343ssvzby 8

05/04/2025, 20:53

250405-zpcfmaxqz6 8

05/04/2025, 20:28

250405-y8y83avtfx 8

05/04/2025, 20:01

250405-yrg88axk17 8

05/04/2025, 19:32

250405-x9bzgswry6 10

05/04/2025, 18:48

250405-xgakystvgs 10

General

  • Target

    https://learn.microsoft.com/en-us/windows/win32/inputdev/virtual-key-codes

  • Sample

    250405-p2ndjswxdt

Malware Config

Targets

    • Target

      https://learn.microsoft.com/en-us/windows/win32/inputdev/virtual-key-codes

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks