General

  • Target

    Krnl.exe

  • Size

    1.8MB

  • Sample

    240627-tn781syhmd

  • MD5

    e9cdcd3816bbd105ca2f309af36bc16d

  • SHA1

    fc3fdd5e7fa88defdf76b8307b0fa2be48a45db4

  • SHA256

    c24855d316a3f7e445035168a2f03dd09d8e69ae35cd4c3d1c27674288383896

  • SHA512

    c8aa7fa445539017aaf09936f308c9743c1d1cfcf00ebc98ede98212e22acf8ea7d8738a9d11b759910af866b1d0786e4850bdd12a9fc7002d2d9d4cef5c3867

  • SSDEEP

    24576:ePABanooMW/8umFbh8A0SsKFucT+KNgxysc5U7ecSgL6y+gk+rnxdarFsP:eP1uB0SV1+KSxyr5UzS65+x+rnxYruP

Malware Config

Targets

    • Target

      Krnl.exe

    • Size

      1.8MB

    • MD5

      e9cdcd3816bbd105ca2f309af36bc16d

    • SHA1

      fc3fdd5e7fa88defdf76b8307b0fa2be48a45db4

    • SHA256

      c24855d316a3f7e445035168a2f03dd09d8e69ae35cd4c3d1c27674288383896

    • SHA512

      c8aa7fa445539017aaf09936f308c9743c1d1cfcf00ebc98ede98212e22acf8ea7d8738a9d11b759910af866b1d0786e4850bdd12a9fc7002d2d9d4cef5c3867

    • SSDEEP

      24576:ePABanooMW/8umFbh8A0SsKFucT+KNgxysc5U7ecSgL6y+gk+rnxdarFsP:eP1uB0SV1+KSxyr5UzS65+x+rnxYruP

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

7
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

1
T1120

Tasks