General

  • Target

    H2 (2).exe

  • Size

    22KB

  • Sample

    240629-dyscjstall

  • MD5

    b014736055c3a7cf6af257dd7f84af7d

  • SHA1

    d2ac0fb6482c2551a72fac685312c007e3e294d7

  • SHA256

    d4d5d15a80019ad35455718f42d67ee828aa3a9fe7ed6433fb540d0182432c86

  • SHA512

    c7401a8dc2c977628f145ff47c162a202709d24ed921ffd4448eb5d97adaaaf8c20244d85649a3dbc17721399b6988b35c4eb6c7b57d17f8492035a93176cb27

  • SSDEEP

    384:Pl5PmikkxZNVUwSymwfixj1VUVIx2b4KJBy/V+wTMUufgqflVW9s:PlxkkDmp9UbdvQMSAlU9

Malware Config

Targets

    • Target

      H2 (2).exe

    • Size

      22KB

    • MD5

      b014736055c3a7cf6af257dd7f84af7d

    • SHA1

      d2ac0fb6482c2551a72fac685312c007e3e294d7

    • SHA256

      d4d5d15a80019ad35455718f42d67ee828aa3a9fe7ed6433fb540d0182432c86

    • SHA512

      c7401a8dc2c977628f145ff47c162a202709d24ed921ffd4448eb5d97adaaaf8c20244d85649a3dbc17721399b6988b35c4eb6c7b57d17f8492035a93176cb27

    • SSDEEP

      384:Pl5PmikkxZNVUwSymwfixj1VUVIx2b4KJBy/V+wTMUufgqflVW9s:PlxkkDmp9UbdvQMSAlU9

    • UAC bypass

    • Disables RegEdit via registry modification

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks