General
-
Target
03379d570b8a4b1adff1d94a950baa46
-
Size
104KB
-
Sample
231229-za862sdbek
-
MD5
03379d570b8a4b1adff1d94a950baa46
-
SHA1
b798509dd60898fcec85588407111c55628337af
-
SHA256
f54a075ca55e9093b22f94bd775873ff567e2a0ee5ebf74f5432471fd67395f5
-
SHA512
0e46f85e7419cbeafb936e1c096f554b5d11d229e4b66b031a634a9bf08c98d0299f3510c8e50de1f4065fb0d9cbcde8537757211268818892d323ed69e1845a
-
SSDEEP
1536:MswlZ5/597LXCREoXo46BK0IFOsjKyGjk:MpH9nCREh46c0KOfj
Static task
static1
Behavioral task
behavioral1
Sample
03379d570b8a4b1adff1d94a950baa46.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03379d570b8a4b1adff1d94a950baa46.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
03379d570b8a4b1adff1d94a950baa46
-
Size
104KB
-
MD5
03379d570b8a4b1adff1d94a950baa46
-
SHA1
b798509dd60898fcec85588407111c55628337af
-
SHA256
f54a075ca55e9093b22f94bd775873ff567e2a0ee5ebf74f5432471fd67395f5
-
SHA512
0e46f85e7419cbeafb936e1c096f554b5d11d229e4b66b031a634a9bf08c98d0299f3510c8e50de1f4065fb0d9cbcde8537757211268818892d323ed69e1845a
-
SSDEEP
1536:MswlZ5/597LXCREoXo46BK0IFOsjKyGjk:MpH9nCREh46c0KOfj
Score10/10-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Disables use of System Restore points
-
Drops startup file
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6