General
-
Target
Windows10Corruptions.zip
-
Size
25.9MB
-
Sample
221204-a47gwacb46
-
MD5
58ced9055dad414215ccb68b9c03bf75
-
SHA1
fe0126aa4cba59bfa3cb3eeb1ce91b43832a1167
-
SHA256
85370541ae0630c1bfb0ca871198c2534f0eb6e6319cab9a5980c568940c6ff3
-
SHA512
06740e453829a2fbcba3a4e034106074eb221d79ba53051987ca9efac04306dc7c8408f2d8e74ea12071bd1eade79485a9a3d341679d3c22e29f7073d7b0349c
-
SSDEEP
786432:hT0wE+ZpLR9z1ITG06cdVVT+zCnz5UGvaaDWsY6kS:pa+fLR12q0HfCzmZaKNYs
Static task
static1
Behavioral task
behavioral1
Sample
Windows10Corruptions.zip
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
Windows10Corruptions.zip
-
Size
25.9MB
-
MD5
58ced9055dad414215ccb68b9c03bf75
-
SHA1
fe0126aa4cba59bfa3cb3eeb1ce91b43832a1167
-
SHA256
85370541ae0630c1bfb0ca871198c2534f0eb6e6319cab9a5980c568940c6ff3
-
SHA512
06740e453829a2fbcba3a4e034106074eb221d79ba53051987ca9efac04306dc7c8408f2d8e74ea12071bd1eade79485a9a3d341679d3c22e29f7073d7b0349c
-
SSDEEP
786432:hT0wE+ZpLR9z1ITG06cdVVT+zCnz5UGvaaDWsY6kS:pa+fLR12q0HfCzmZaKNYs
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Modifies system executable filetype association
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Looks for VMWare Tools registry key
-
Modifies Installed Components in the registry
-
Registers COM server for autorun
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v6
Persistence
Browser Extensions
1Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
4Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Hidden Files and Directories
2Modify Registry
11Virtualization/Sandbox Evasion
1