General
-
Target
c4de8f36a329efc4399d74fe06a89f5f372701ccfaaa410487aa22fe5b023033
-
Size
255KB
-
Sample
221127-abgezsed76
-
MD5
5c92c2744a434f94e8edb56a25b2ec2f
-
SHA1
f17731b0ea8846b838c71dab00476de9af341194
-
SHA256
c4de8f36a329efc4399d74fe06a89f5f372701ccfaaa410487aa22fe5b023033
-
SHA512
b1d0296a9b8b35f8a311ed6a43909022b841657bf28840d521925e1fa76b6125b937f96eab58fe2d61f7c681e12a56f6bd8e3c0861a5f65fc40868e341c4b0cb
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJj:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI2
Behavioral task
behavioral1
Sample
c4de8f36a329efc4399d74fe06a89f5f372701ccfaaa410487aa22fe5b023033.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
c4de8f36a329efc4399d74fe06a89f5f372701ccfaaa410487aa22fe5b023033
-
Size
255KB
-
MD5
5c92c2744a434f94e8edb56a25b2ec2f
-
SHA1
f17731b0ea8846b838c71dab00476de9af341194
-
SHA256
c4de8f36a329efc4399d74fe06a89f5f372701ccfaaa410487aa22fe5b023033
-
SHA512
b1d0296a9b8b35f8a311ed6a43909022b841657bf28840d521925e1fa76b6125b937f96eab58fe2d61f7c681e12a56f6bd8e3c0861a5f65fc40868e341c4b0cb
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJj:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI2
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7