General
-
Target
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82
-
Size
271KB
-
Sample
231007-jetn6acb56
-
MD5
1a745c946198f16fdcf3c902de26341b
-
SHA1
b8ac4346dc294cdb8defdfdcd8169a8308f614c6
-
SHA256
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82
-
SHA512
9bb81b59b63fbfc788f0df2cf3c3e56a92ef6bc714c4a12ce162d4eccd0c40307a75286338b1ad10b66a27d3563c53ca01a3a58572110e9c496fb06a780abf14
-
SSDEEP
6144:yl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:KqXUHkUXe3GOkx2LIa
Behavioral task
behavioral1
Sample
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82
-
Size
271KB
-
MD5
1a745c946198f16fdcf3c902de26341b
-
SHA1
b8ac4346dc294cdb8defdfdcd8169a8308f614c6
-
SHA256
413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82
-
SHA512
9bb81b59b63fbfc788f0df2cf3c3e56a92ef6bc714c4a12ce162d4eccd0c40307a75286338b1ad10b66a27d3563c53ca01a3a58572110e9c496fb06a780abf14
-
SSDEEP
6144:yl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:KqXUHkUXe3GOkx2LIa
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-