General
-
Target
c556c0563cc1455a9d0a78d2a0d051b9d4a61b0d7f62502a6ed64553fe629799
-
Size
808KB
-
Sample
221014-lm1tjshfcp
-
MD5
5735bf8bd70fc8f8b38e0e38cfbcef88
-
SHA1
7da368e57773738a737098113f8122d5f838ea9a
-
SHA256
c556c0563cc1455a9d0a78d2a0d051b9d4a61b0d7f62502a6ed64553fe629799
-
SHA512
2a3950b5191ad1d01650f4fb31613181aa4aa11798ad8b536868f0034b72de19acb037db5740c822b8dda6dd99739e355cd60762bb36f3e1c81d808c67c07ce2
-
SSDEEP
12288:DcyDz+j8zC/POs/RszSpabbs3JYNpYEzw8kY47hW6DgyPg7VjfAiABU:Dc2+ms5pavs+NpM9nXg79CU
Static task
static1
Behavioral task
behavioral1
Sample
c556c0563cc1455a9d0a78d2a0d051b9d4a61b0d7f62502a6ed64553fe629799.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
c556c0563cc1455a9d0a78d2a0d051b9d4a61b0d7f62502a6ed64553fe629799
-
Size
808KB
-
MD5
5735bf8bd70fc8f8b38e0e38cfbcef88
-
SHA1
7da368e57773738a737098113f8122d5f838ea9a
-
SHA256
c556c0563cc1455a9d0a78d2a0d051b9d4a61b0d7f62502a6ed64553fe629799
-
SHA512
2a3950b5191ad1d01650f4fb31613181aa4aa11798ad8b536868f0034b72de19acb037db5740c822b8dda6dd99739e355cd60762bb36f3e1c81d808c67c07ce2
-
SSDEEP
12288:DcyDz+j8zC/POs/RszSpabbs3JYNpYEzw8kY47hW6DgyPg7VjfAiABU:Dc2+ms5pavs+NpM9nXg79CU
-
Modifies WinLogon for persistence
-
Modifies security service
-
Modifies visiblity of hidden/system files in Explorer
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-