General
-
Target
12644767577b43190c147eb528390c86
-
Size
1.5MB
-
Sample
231230-jhrnzaegd2
-
MD5
12644767577b43190c147eb528390c86
-
SHA1
088d7b371666ae85980b073abfc6b9d7bedc68a1
-
SHA256
6d268e1943de4e9206e54f14e59fa8553ac76b8a95130446569d1a3cb1a71d5e
-
SHA512
9c89623893c35965265e667e625842b4c09c5f72e20b09367751cccc84aa8134ff99e3e5278cbb1c5ff9f8ced1f9797df19503f918d8774fe6e8fb4869b91050
-
SSDEEP
3072:15yU9nkjkbumccSJ5l/LUkXTpkiOY0R3iLv:X
Static task
static1
Behavioral task
behavioral1
Sample
12644767577b43190c147eb528390c86.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
12644767577b43190c147eb528390c86
-
Size
1.5MB
-
MD5
12644767577b43190c147eb528390c86
-
SHA1
088d7b371666ae85980b073abfc6b9d7bedc68a1
-
SHA256
6d268e1943de4e9206e54f14e59fa8553ac76b8a95130446569d1a3cb1a71d5e
-
SHA512
9c89623893c35965265e667e625842b4c09c5f72e20b09367751cccc84aa8134ff99e3e5278cbb1c5ff9f8ced1f9797df19503f918d8774fe6e8fb4869b91050
-
SSDEEP
3072:15yU9nkjkbumccSJ5l/LUkXTpkiOY0R3iLv:X
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2