General
-
Target
file.exe
-
Size
7.3MB
-
Sample
220925-sngwdsfbf2
-
MD5
41d606d4333702996c5a6878a9272cac
-
SHA1
40e31b7b91396cc39813a131975ea711c34f7b75
-
SHA256
cbdbdc82c330e09ce4cf89d4ba8f5eadfa61b40b41cdeb332419bf35c642e1f8
-
SHA512
8842d93a9b61788ed086867905e4f985a7f851bef23eaf586a37ee4db160b33d2c9b515ba00dd76b2910514072e7e1e65fa59752ac51b8d5a0772b1dc5991ce8
-
SSDEEP
196608:91OO0y2KXnPWRS+tSqcK9Pwd9PF0sIyQHaywv4RYWHwkYXfI:3OO0JSP8htDcKZyNE5NRYWHwkYvI
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.3MB
-
MD5
41d606d4333702996c5a6878a9272cac
-
SHA1
40e31b7b91396cc39813a131975ea711c34f7b75
-
SHA256
cbdbdc82c330e09ce4cf89d4ba8f5eadfa61b40b41cdeb332419bf35c642e1f8
-
SHA512
8842d93a9b61788ed086867905e4f985a7f851bef23eaf586a37ee4db160b33d2c9b515ba00dd76b2910514072e7e1e65fa59752ac51b8d5a0772b1dc5991ce8
-
SSDEEP
196608:91OO0y2KXnPWRS+tSqcK9Pwd9PF0sIyQHaywv4RYWHwkYXfI:3OO0JSP8htDcKZyNE5NRYWHwkYvI
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-