General
-
Target
file.exe
-
Size
7.2MB
-
Sample
220924-wmfhqabga6
-
MD5
da8b0897ff6ef0481fa60f827fa305f8
-
SHA1
1b870ce2d24b08b9492d99b1db184d981fab3037
-
SHA256
b652decb3309474b5c9d06f2d7d365fb1bc45c8c771a5cf842d1244c74085bc2
-
SHA512
6ebfd3e280393c633973ac4a40e884f9af21943b5d2464ac400b7c4b05d7a0f7cf3778441d16fd2100650a24fe01f3bf468ac181e1686debc7b7c2765d457863
-
SSDEEP
98304:91OzLZSZ3nS8J4Sa1SzBg/KUsmANdGhK6KaSqBTX5wDuITnoNLm7OC12tj6IW8nx:91OzFeCSBAsmAuo6B1XuDuRN5VxhyK
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.2MB
-
MD5
da8b0897ff6ef0481fa60f827fa305f8
-
SHA1
1b870ce2d24b08b9492d99b1db184d981fab3037
-
SHA256
b652decb3309474b5c9d06f2d7d365fb1bc45c8c771a5cf842d1244c74085bc2
-
SHA512
6ebfd3e280393c633973ac4a40e884f9af21943b5d2464ac400b7c4b05d7a0f7cf3778441d16fd2100650a24fe01f3bf468ac181e1686debc7b7c2765d457863
-
SSDEEP
98304:91OzLZSZ3nS8J4Sa1SzBg/KUsmANdGhK6KaSqBTX5wDuITnoNLm7OC12tj6IW8nx:91OzFeCSBAsmAuo6B1XuDuRN5VxhyK
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-