General
-
Target
file.exe
-
Size
7.3MB
-
Sample
221021-ey8vzabgbk
-
MD5
0d4411bd7cf711912012b7e3c75ea50e
-
SHA1
a13858bd7a0287bfa8b036cc68159b78804834f6
-
SHA256
2299090b9cd36e59462655cfbb2e1d13c77d8abc6c1e9ad09cd2eb07b47191f1
-
SHA512
1f25cc4fa3b497fc51228f2cb0763ae5fa21af7c5df6ccb501c9ebac29aa5130eb8a7dd141b3ea8012fb96ac6c49300318eeb908959b69d40407437e9d5543be
-
SSDEEP
196608:91OpL6NhHl2Q4hiIu/dA21dBLWIHz8ZbM20SlOg2d+iS:3OsN5lIEH1dBLWaIR3CnS
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.3MB
-
MD5
0d4411bd7cf711912012b7e3c75ea50e
-
SHA1
a13858bd7a0287bfa8b036cc68159b78804834f6
-
SHA256
2299090b9cd36e59462655cfbb2e1d13c77d8abc6c1e9ad09cd2eb07b47191f1
-
SHA512
1f25cc4fa3b497fc51228f2cb0763ae5fa21af7c5df6ccb501c9ebac29aa5130eb8a7dd141b3ea8012fb96ac6c49300318eeb908959b69d40407437e9d5543be
-
SSDEEP
196608:91OpL6NhHl2Q4hiIu/dA21dBLWIHz8ZbM20SlOg2d+iS:3OsN5lIEH1dBLWaIR3CnS
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-