Heading goes here
Image Description
Common Information
Type Value
UUID ddf5e63c-f38f-4920-9dff-791751d71f21
Fingerprint 6e03c4607932ec7359a6f7be6a5cf3a7304efddbd504e7a209b77728bc5a95fe
Analysis status DONE
Considered CTI value 2
Text language
Published Jan. 24, 2024, 10:16 a.m.
Added to db April 5, 2024, 3:57 p.m.
Last updated Aug. 31, 2024, 8:33 a.m.
Headline Heading goes here
Title Heading goes here
Detected Hints/Tags/Attributes 33/2/34
Attributes
Details Type #Events CTI Value
Details Domain 1373
twitter.com
Details Domain 7
jp.security.ntt
Details Domain 118
sekoia.io
Details Domain 58
blog.sekoia.io
Details Domain 101
www.elastic.co
Details Domain 45
hack.lu
Details Domain 207
learn.microsoft.com
Details Domain 452
msrc.microsoft.com
Details Domain 4127
github.com
Details Domain 360
attack.mitre.org
Details File 153
config.json
Details File 2
startingscriptwrapper.ps1
Details File 9
appxmanifest.xml
Details File 1
vc10.dll
Details File 1
makeappx.exe
Details File 1
show_message.exe
Details File 1
makepri.exe
Details File 3
aistubx64.exe
Details File 5
run.ps1
Details File 5
appxblockmap.xml
Details Github username 1
pan-
Details MITRE ATT&CK Techniques 3
T1546.016
Details MITRE ATT&CK Techniques 43
T1546
Details Url 1
https://twitter.com/nao_sec/status/1630435399905705986
Details Url 1
https://jp.security.ntt/tech_blog/102ignh
Details Url 1
https://blog.sekoia.io/clearfake-a-newcomer-to-the-fake-updates-
Details Url 1
https://www.elastic.co/security-labs/ghostpulse-
Details Url 1
https://learn.microsoft.com/ja-jp/windows/msix/overview
Details Url 1
https://learn.microsoft.com/ja-jp/windows/msix/psf/package-support-framework
Details Url 1
https://msrc.microsoft.com/blog/2024/01/microsoft-addresses-app-installer-abuse-ja
Details Url 1
https://github.com/pan-
Details Url 1
https://attack.mitre.org/techniques/t1546/016
Details Url 1
https://learn.microsoft.com/ja-jp/uwp/schemas/appxpackage/uapmanifestschema/element-application
Details Yara rule 1
rule hunting_msix_appx {
	strings:
		$a00 = "AppxManifest.xml"
		$a01 = "AppxBlockMap.xml"
		$a03 = "AppxSignature.p7x"
	condition:
		uint16(0) == 0x4b50 and all of them
}