General
-
Target
WIN_20230904_22_44_24_Pro.jpg
-
Size
240KB
-
Sample
231009-3jce8abb24
-
MD5
2a34ccca435ec5f7fe7d3aa0994c43bb
-
SHA1
957a8d917e9f795089dbc8ec95906530ba4b6ba1
-
SHA256
a5a99b75b4cfbf2ee2fa04e09d3b4714e4710d5edde4d4807b9a15449ee3199b
-
SHA512
7997510647b4d1999733f5af7b314f60f3dea09f970898e251754e72c8bbc18ecf5780ab1fecd4b19442d136f9a0943a95024385d60d42b1585ec46a6137545a
-
SSDEEP
6144:cgwkJICGdV/WpuY9e5GtcYeAHsb//C7FciH:cgnJICGdV/Oe5Ge1sciH
Static task
static1
Behavioral task
behavioral1
Sample
WIN_20230904_22_44_24_Pro.jpg
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
WIN_20230904_22_44_24_Pro.jpg
-
Size
240KB
-
MD5
2a34ccca435ec5f7fe7d3aa0994c43bb
-
SHA1
957a8d917e9f795089dbc8ec95906530ba4b6ba1
-
SHA256
a5a99b75b4cfbf2ee2fa04e09d3b4714e4710d5edde4d4807b9a15449ee3199b
-
SHA512
7997510647b4d1999733f5af7b314f60f3dea09f970898e251754e72c8bbc18ecf5780ab1fecd4b19442d136f9a0943a95024385d60d42b1585ec46a6137545a
-
SSDEEP
6144:cgwkJICGdV/WpuY9e5GtcYeAHsb//C7FciH:cgnJICGdV/Oe5Ge1sciH
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5