General
-
Target
0f6c9ce864ca5a40348b4c128d10c964
-
Size
208KB
-
Sample
231224-yrajdafahn
-
MD5
0f6c9ce864ca5a40348b4c128d10c964
-
SHA1
64758445ad7f8b28a8f04dbd38e11cb57be4de57
-
SHA256
48cad7de3bb1247a5fafff1d3a206c3ec11c37b51b125176e4c8de92308a232c
-
SHA512
e6d7eecee4304bd7df5d52347ee001e19298846ec0f3af2a6f394c77a5368791f087b2897d06aea99fec97461638de3183a47b6248e6e0ed9516ea8d3daf4ad2
-
SSDEEP
3072:cOJopl0OAbGi6sW3hMKtiV8QwOKqTg63vkHnjwD:Cl0HNTeMVldrU63vEnU
Static task
static1
Behavioral task
behavioral1
Sample
0f6c9ce864ca5a40348b4c128d10c964.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
0f6c9ce864ca5a40348b4c128d10c964
-
Size
208KB
-
MD5
0f6c9ce864ca5a40348b4c128d10c964
-
SHA1
64758445ad7f8b28a8f04dbd38e11cb57be4de57
-
SHA256
48cad7de3bb1247a5fafff1d3a206c3ec11c37b51b125176e4c8de92308a232c
-
SHA512
e6d7eecee4304bd7df5d52347ee001e19298846ec0f3af2a6f394c77a5368791f087b2897d06aea99fec97461638de3183a47b6248e6e0ed9516ea8d3daf4ad2
-
SSDEEP
3072:cOJopl0OAbGi6sW3hMKtiV8QwOKqTg63vkHnjwD:Cl0HNTeMVldrU63vEnU
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2