General
-
Target
1810092b7599bad7adea10aeaf4df0c2af29fc85c0904662bab674f231752e22
-
Size
594KB
-
Sample
210228-d784ergj3n
-
MD5
6815e92e3b69abb83257aff53ccf411b
-
SHA1
dd588b78d08d8eea3f553fe1cec692ac2340111b
-
SHA256
1810092b7599bad7adea10aeaf4df0c2af29fc85c0904662bab674f231752e22
-
SHA512
1227bf5619eb7ae56ca4382db764cb55db5a77c3f549cfc478ddee59e35f24408848e737f005209ffa289414a2eb6f5128bd002c95448b103485e33f5bb054a1
Static task
static1
Behavioral task
behavioral1
Sample
1810092b7599bad7adea10aeaf4df0c2af29fc85c0904662bab674f231752e22.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1810092b7599bad7adea10aeaf4df0c2af29fc85c0904662bab674f231752e22.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
1810092b7599bad7adea10aeaf4df0c2af29fc85c0904662bab674f231752e22
-
Size
594KB
-
MD5
6815e92e3b69abb83257aff53ccf411b
-
SHA1
dd588b78d08d8eea3f553fe1cec692ac2340111b
-
SHA256
1810092b7599bad7adea10aeaf4df0c2af29fc85c0904662bab674f231752e22
-
SHA512
1227bf5619eb7ae56ca4382db764cb55db5a77c3f549cfc478ddee59e35f24408848e737f005209ffa289414a2eb6f5128bd002c95448b103485e33f5bb054a1
-
Modifies WinLogon for persistence
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies WinLogon to allow AutoLogon
Enables rebooting of the machine without requiring login credentials.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-