General
-
Target
0fd0fff8835c67f627c0e0e3b2a55f12
-
Size
262KB
-
Sample
231230-fza6rsfbc2
-
MD5
0fd0fff8835c67f627c0e0e3b2a55f12
-
SHA1
db6a26f67ef5278980c4f5452f79de5d7c0f62fc
-
SHA256
e8ef7886c7c5ad1b6023e420e50707795386f44320d644712183d286e55e38d2
-
SHA512
7fa0bd92579036a1b18dc6c32d3f192d4caf2b10ef8b182fc513e6b7c23c9d5d70643259102468a4136e2da59b9bb540aa503e1d05c205043e0edb1f33c50b7f
-
SSDEEP
3072:BDrF9h20NUmzQze45ggO8/tmiG+lDe7eWQbFo90mcrWt7HrOgwcoutZ:B19RNUmzQzjgH8/tmiGqcoS
Behavioral task
behavioral1
Sample
0fd0fff8835c67f627c0e0e3b2a55f12.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
0fd0fff8835c67f627c0e0e3b2a55f12
-
Size
262KB
-
MD5
0fd0fff8835c67f627c0e0e3b2a55f12
-
SHA1
db6a26f67ef5278980c4f5452f79de5d7c0f62fc
-
SHA256
e8ef7886c7c5ad1b6023e420e50707795386f44320d644712183d286e55e38d2
-
SHA512
7fa0bd92579036a1b18dc6c32d3f192d4caf2b10ef8b182fc513e6b7c23c9d5d70643259102468a4136e2da59b9bb540aa503e1d05c205043e0edb1f33c50b7f
-
SSDEEP
3072:BDrF9h20NUmzQze45ggO8/tmiG+lDe7eWQbFo90mcrWt7HrOgwcoutZ:B19RNUmzQzjgH8/tmiGqcoS
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2