General
-
Target
13d9d62704e5d0a59e34a788918b8f2056e5381456fdf8004d4c8d492677b80f
-
Size
680KB
-
Sample
221004-ejk6csbef5
-
MD5
5794fd2112bd2b98aaadcc4d98eeab31
-
SHA1
c16beb8612234215d8f195f75fb0c1d4967705ec
-
SHA256
13d9d62704e5d0a59e34a788918b8f2056e5381456fdf8004d4c8d492677b80f
-
SHA512
84c6be81302260a1f3488c65798c56a15eeab02155bf744eac57ccb216028211b7be51079f756d8cce05f4154c8f248903f5d65df5dea9e7b16fc375c9217692
-
SSDEEP
12288:SClephVMo7IYJAB++2RrxRAjbeNC2v+clES+vYOqH:HOhKpYyB/MrxRAZMES+b+
Static task
static1
Behavioral task
behavioral1
Sample
13d9d62704e5d0a59e34a788918b8f2056e5381456fdf8004d4c8d492677b80f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13d9d62704e5d0a59e34a788918b8f2056e5381456fdf8004d4c8d492677b80f.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
13d9d62704e5d0a59e34a788918b8f2056e5381456fdf8004d4c8d492677b80f
-
Size
680KB
-
MD5
5794fd2112bd2b98aaadcc4d98eeab31
-
SHA1
c16beb8612234215d8f195f75fb0c1d4967705ec
-
SHA256
13d9d62704e5d0a59e34a788918b8f2056e5381456fdf8004d4c8d492677b80f
-
SHA512
84c6be81302260a1f3488c65798c56a15eeab02155bf744eac57ccb216028211b7be51079f756d8cce05f4154c8f248903f5d65df5dea9e7b16fc375c9217692
-
SSDEEP
12288:SClephVMo7IYJAB++2RrxRAjbeNC2v+clES+vYOqH:HOhKpYyB/MrxRAZMES+b+
Score10/10-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-