General
-
Target
file.exe
-
Size
7.3MB
-
Sample
220926-bc8fjaggc9
-
MD5
f9b08a0b4df48efc072fdc16cb5dd22a
-
SHA1
8a91db8504ca2362219f3c563a04be56a48daaf5
-
SHA256
73d467286994dcc55455b90d2b4e5ad771b21e97a666a500141e05c567c67422
-
SHA512
5b4a331f2f57192881a3d9f8d271ea3caa190372ca0a7e5c0d1eba193d25c6435110110d3f6083f5f557e6d9845aad081512fa6a4504d88a114ed16a1268dce7
-
SSDEEP
196608:91OqA/UtvlgsQVJR7LOIDJonq4IsaDzfWwOdkoFQHZHCpI+:3ON/uvtQl+IDGq4piDGQHwN
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.3MB
-
MD5
f9b08a0b4df48efc072fdc16cb5dd22a
-
SHA1
8a91db8504ca2362219f3c563a04be56a48daaf5
-
SHA256
73d467286994dcc55455b90d2b4e5ad771b21e97a666a500141e05c567c67422
-
SHA512
5b4a331f2f57192881a3d9f8d271ea3caa190372ca0a7e5c0d1eba193d25c6435110110d3f6083f5f557e6d9845aad081512fa6a4504d88a114ed16a1268dce7
-
SSDEEP
196608:91OqA/UtvlgsQVJR7LOIDJonq4IsaDzfWwOdkoFQHZHCpI+:3ON/uvtQl+IDGq4piDGQHwN
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-