General
-
Target
e98859fee92bbe259ad1ac029c8dd2b062912b39285cfaf96cc6b0966861d451
-
Size
3.1MB
-
Sample
220414-jrxlksagem
-
MD5
bb4a0356730da7a83b088a0339d922ea
-
SHA1
cea3e93d7825090226a23053f4714a4011ddb6de
-
SHA256
e98859fee92bbe259ad1ac029c8dd2b062912b39285cfaf96cc6b0966861d451
-
SHA512
4b263e94c8d3b1ad4a34d9dfd8ac2eb9a542cdc57e9ddf8fb4c1c3c4d396d802723457e235060db2642660bfa88f6c45a0996c682bc53d04e5c4c9f697eab5f8
Static task
static1
Behavioral task
behavioral1
Sample
e98859fee92bbe259ad1ac029c8dd2b062912b39285cfaf96cc6b0966861d451.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
e98859fee92bbe259ad1ac029c8dd2b062912b39285cfaf96cc6b0966861d451.exe
Resource
win10v2004-20220310-en
Malware Config
Targets
-
-
Target
e98859fee92bbe259ad1ac029c8dd2b062912b39285cfaf96cc6b0966861d451
-
Size
3.1MB
-
MD5
bb4a0356730da7a83b088a0339d922ea
-
SHA1
cea3e93d7825090226a23053f4714a4011ddb6de
-
SHA256
e98859fee92bbe259ad1ac029c8dd2b062912b39285cfaf96cc6b0966861d451
-
SHA512
4b263e94c8d3b1ad4a34d9dfd8ac2eb9a542cdc57e9ddf8fb4c1c3c4d396d802723457e235060db2642660bfa88f6c45a0996c682bc53d04e5c4c9f697eab5f8
Score8/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-