General
-
Target
05e7034160522201de6324078818b562
-
Size
512KB
-
Sample
231225-fdjwsabbg5
-
MD5
05e7034160522201de6324078818b562
-
SHA1
29d72e130ce958186446839139d25e0415cdc587
-
SHA256
8679615f3852762d7dd71fcd657b86cdf0c4f56dcf3e6e991b65770752c57bfe
-
SHA512
5d566113f3ed3df1a4baebc8ce80a300901a5ab8e20dafaabf33e824c26191f4281c64a783901743ebd71e69602b239f4158819a536e3d147d7e629c5efe4e9a
-
SSDEEP
12288:WNge6O1X/GkpN4hpCHvmc+5zR2JqaAwUKPF2mqhScG:Q96SPGm4b06aqpwl2mqIc
Static task
static1
Behavioral task
behavioral1
Sample
05e7034160522201de6324078818b562.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
05e7034160522201de6324078818b562
-
Size
512KB
-
MD5
05e7034160522201de6324078818b562
-
SHA1
29d72e130ce958186446839139d25e0415cdc587
-
SHA256
8679615f3852762d7dd71fcd657b86cdf0c4f56dcf3e6e991b65770752c57bfe
-
SHA512
5d566113f3ed3df1a4baebc8ce80a300901a5ab8e20dafaabf33e824c26191f4281c64a783901743ebd71e69602b239f4158819a536e3d147d7e629c5efe4e9a
-
SSDEEP
12288:WNge6O1X/GkpN4hpCHvmc+5zR2JqaAwUKPF2mqhScG:Q96SPGm4b06aqpwl2mqIc
-
Modifies security service
-
Modifies visiblity of hidden/system files in Explorer
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
6