General

  • Target

    Neues Textdokument.txt

  • Size

    77B

  • Sample

    240629-prtgtazhqn

  • MD5

    f0956b6203d3fafafb69743f820f27da

  • SHA1

    0232e38407361762564ff54f2b82957792f2c408

  • SHA256

    7b6aac08a062cf85e176dbd19137b6549606d5def9dacf3684432fccb10bbcb9

  • SHA512

    eff36b1dde5d176832586cf632e5f483f73328110c1084ec281b3fec089bd3dcae2541c4227449f646fc83f1d6bbbdf49f01f4e48efed4eb7d456761415cf580

Malware Config

Targets

    • Target

      Neues Textdokument.txt

    • Size

      77B

    • MD5

      f0956b6203d3fafafb69743f820f27da

    • SHA1

      0232e38407361762564ff54f2b82957792f2c408

    • SHA256

      7b6aac08a062cf85e176dbd19137b6549606d5def9dacf3684432fccb10bbcb9

    • SHA512

      eff36b1dde5d176832586cf632e5f483f73328110c1084ec281b3fec089bd3dcae2541c4227449f646fc83f1d6bbbdf49f01f4e48efed4eb7d456761415cf580

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

3
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

System Information Discovery

3
T1082

Query Registry

1
T1012

Tasks