General
-
Target
1bc2773278db821664d3e40252a56f8f
-
Size
635KB
-
Sample
231230-y5xk3afed6
-
MD5
1bc2773278db821664d3e40252a56f8f
-
SHA1
7860f17d866f74d0a5e1317e853251e9c7062e3b
-
SHA256
23ce8f18319d943325c46641dc8f7d3bcfb87f7008e4cc25b1262d188f397439
-
SHA512
10f6759f42ae811e27411ebe3e856d7319134847c68d4d7def5a80911fb30e1a1c8b0bc6aa6ea9d7dd6ebe0b9bd54c1709ead40afd7293108f30f38b0213b09f
-
SSDEEP
12288:I3TdtLW5WIj1YSSdFxsBSXyMzBUWb9tx/9AgHLo8OW+rB:iDsj1dEcBcJ9nnx/igrp+
Behavioral task
behavioral1
Sample
1bc2773278db821664d3e40252a56f8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bc2773278db821664d3e40252a56f8f.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
1bc2773278db821664d3e40252a56f8f
-
Size
635KB
-
MD5
1bc2773278db821664d3e40252a56f8f
-
SHA1
7860f17d866f74d0a5e1317e853251e9c7062e3b
-
SHA256
23ce8f18319d943325c46641dc8f7d3bcfb87f7008e4cc25b1262d188f397439
-
SHA512
10f6759f42ae811e27411ebe3e856d7319134847c68d4d7def5a80911fb30e1a1c8b0bc6aa6ea9d7dd6ebe0b9bd54c1709ead40afd7293108f30f38b0213b09f
-
SSDEEP
12288:I3TdtLW5WIj1YSSdFxsBSXyMzBUWb9tx/9AgHLo8OW+rB:iDsj1dEcBcJ9nnx/igrp+
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1