General

  • Target

    file.exe

  • Size

    7.2MB

  • Sample

    221123-j15csagd33

  • MD5

    8c5b98d1533f9b159f21e22cd4589f6f

  • SHA1

    989c1a42a4d0fb628e7705bcdffc2d5756123f32

  • SHA256

    3400022479d04143bff1f69239642a76a3004e706f997815d668f4ad4e95990c

  • SHA512

    7bdd65de413dca38919c7e4a0c7bac777375b77ef98e68814201ee4e3fcbd9ddff26be3a8695b91c39c0ca8a1ef1363047ef6e136c90e2b29df75e0c4d3612a9

  • SSDEEP

    196608:91OH4cAHwJUMF8ufmlLAn584i+/51GTCscMvU:3OHhAmUMmlP4i+hQzcMvU

Score
10/10

Malware Config

Targets

    • Target

      file.exe

    • Size

      7.2MB

    • MD5

      8c5b98d1533f9b159f21e22cd4589f6f

    • SHA1

      989c1a42a4d0fb628e7705bcdffc2d5756123f32

    • SHA256

      3400022479d04143bff1f69239642a76a3004e706f997815d668f4ad4e95990c

    • SHA512

      7bdd65de413dca38919c7e4a0c7bac777375b77ef98e68814201ee4e3fcbd9ddff26be3a8695b91c39c0ca8a1ef1363047ef6e136c90e2b29df75e0c4d3612a9

    • SSDEEP

      196608:91OH4cAHwJUMF8ufmlLAn584i+/51GTCscMvU:3OHhAmUMmlP4i+hQzcMvU

    Score
    10/10
    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks