General

  • Target

    AECOM General Presentation.exe

  • Size

    313KB

  • Sample

    200629-m7vn6849he

  • MD5

    7fa2d91fa5382248b2731acc75f003a0

  • SHA1

    7576165f1ce2d81ac9963b72e74e28c9934e3a04

  • SHA256

    a2afda47f4169023bca3c730a48e58d6c40e84236b959a871e883ded3304d5fb

  • SHA512

    09c2d3d216ca967238029bb617bb006879050492de0bf20a46a5dc071dd0eaa4eb863180c9fc938f4fcbc79fa900dcb154ae600ac6e091c6e2b3c92965ef0024

Malware Config

Targets

    • Target

      AECOM General Presentation.exe

    • Size

      313KB

    • MD5

      7fa2d91fa5382248b2731acc75f003a0

    • SHA1

      7576165f1ce2d81ac9963b72e74e28c9934e3a04

    • SHA256

      a2afda47f4169023bca3c730a48e58d6c40e84236b959a871e883ded3304d5fb

    • SHA512

      09c2d3d216ca967238029bb617bb006879050492de0bf20a46a5dc071dd0eaa4eb863180c9fc938f4fcbc79fa900dcb154ae600ac6e091c6e2b3c92965ef0024

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Adds Run entry to policy start application

    • Looks for VMWare Tools registry key

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks