Resubmissions

01-07-2024 04:15

240701-evn2dsyhpp 7

01-07-2024 04:14

240701-etv4bawclc 7

General

  • Target

    Stardock Start11 v2.0.7.4 - HaxPC.net.rar

  • Size

    50.4MB

  • Sample

    240701-evn2dsyhpp

  • MD5

    4e5147ecb92436c973fa8dc95fda2dfd

  • SHA1

    fded7b375eb7c1a687f9ecf82dca2dde82c7ef67

  • SHA256

    3eb17d6339fbc7aee72f05936cef737692f7d96a8ba15970b9da3a998a9f3887

  • SHA512

    3001b43d35b86fd4653cdb1ab2380f04688979c2118851c0c0ed325d1b717810494b79a30b594e3b65f3030b1330222e218e1112f257317761e4dd11873d3adf

  • SSDEEP

    1572864:kxftmqJM7A9Ey/Hrhj1Po1DhW7bs5tbbsOH4PB3:kh67wh/HrhjFUW/IbC3

Malware Config

Targets

    • Target

      Stardock Start11 v2.0.7.4 - HaxPC.net.rar

    • Size

      50.4MB

    • MD5

      4e5147ecb92436c973fa8dc95fda2dfd

    • SHA1

      fded7b375eb7c1a687f9ecf82dca2dde82c7ef67

    • SHA256

      3eb17d6339fbc7aee72f05936cef737692f7d96a8ba15970b9da3a998a9f3887

    • SHA512

      3001b43d35b86fd4653cdb1ab2380f04688979c2118851c0c0ed325d1b717810494b79a30b594e3b65f3030b1330222e218e1112f257317761e4dd11873d3adf

    • SSDEEP

      1572864:kxftmqJM7A9Ey/Hrhj1Po1DhW7bs5tbbsOH4PB3:kh67wh/HrhjFUW/IbC3

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

2
T1546

Change Default File Association

1
T1546.001

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

2
T1546

Change Default File Association

1
T1546.001

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks