General
-
Target
22a2fc907d960e67fe9def8946907fd324f77afce3f2792750f1ddb1de76fc9f
-
Size
10.6MB
-
Sample
220524-dgafeagfem
-
MD5
f91f26d0d89bfacb228fcc9d1ca546dc
-
SHA1
19e61923b8fac8149b9109ac6633dba760608218
-
SHA256
22a2fc907d960e67fe9def8946907fd324f77afce3f2792750f1ddb1de76fc9f
-
SHA512
bf4fff966e3fa0f2bed6442ca80a336d607885aa255357e522bc02753d1a4b7e5b25edf0065f8ad1c90491b8c72b0c1ee9b2e097f535e85ad056c80c4e653d1f
Static task
static1
Behavioral task
behavioral1
Sample
22a2fc907d960e67fe9def8946907fd324f77afce3f2792750f1ddb1de76fc9f.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
22a2fc907d960e67fe9def8946907fd324f77afce3f2792750f1ddb1de76fc9f
-
Size
10.6MB
-
MD5
f91f26d0d89bfacb228fcc9d1ca546dc
-
SHA1
19e61923b8fac8149b9109ac6633dba760608218
-
SHA256
22a2fc907d960e67fe9def8946907fd324f77afce3f2792750f1ddb1de76fc9f
-
SHA512
bf4fff966e3fa0f2bed6442ca80a336d607885aa255357e522bc02753d1a4b7e5b25edf0065f8ad1c90491b8c72b0c1ee9b2e097f535e85ad056c80c4e653d1f
-
Modifies visiblity of hidden/system files in Explorer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v6
Persistence
Account Manipulation
1Hidden Files and Directories
3Modify Existing Service
3Registry Run Keys / Startup Folder
2Scheduled Task
1Winlogon Helper DLL
1