General
-
Target
file.exe
-
Size
7.2MB
-
Sample
221222-z16hvafb97
-
MD5
5eb66c5d58f44b54be2a6b4933e31386
-
SHA1
9685cbc7d1bac2f9cbf38c0d5914e5e0b991959d
-
SHA256
fea6682a08b3782f7b53c2fe34bf36d303738ad329688655984e3a0cacd50ae4
-
SHA512
2d216a87daed519a3c026b39a47f6c80fb8c372e9e6f37ede8d9c47fe5af343a95bc93f833238cc20504c25e28fff34726752e1b585c8702ed8d4632f1a39131
-
SSDEEP
196608:91Omxeg0v3hoTKwSBFRxYgIYrk6yzlqCDAKcvZ5xEZt:3O2ezvxo+N6gIYr9kf6kZt
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.2MB
-
MD5
5eb66c5d58f44b54be2a6b4933e31386
-
SHA1
9685cbc7d1bac2f9cbf38c0d5914e5e0b991959d
-
SHA256
fea6682a08b3782f7b53c2fe34bf36d303738ad329688655984e3a0cacd50ae4
-
SHA512
2d216a87daed519a3c026b39a47f6c80fb8c372e9e6f37ede8d9c47fe5af343a95bc93f833238cc20504c25e28fff34726752e1b585c8702ed8d4632f1a39131
-
SSDEEP
196608:91Omxeg0v3hoTKwSBFRxYgIYrk6yzlqCDAKcvZ5xEZt:3O2ezvxo+N6gIYr9kf6kZt
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-