General
-
Target
3899f16e30129406a4a0858f6f16c66c.exe
-
Size
63KB
-
Sample
240105-nvxszaagcq
-
MD5
3899f16e30129406a4a0858f6f16c66c
-
SHA1
2bac48457a15908d400c06f8dff0ccf87ec4fc7e
-
SHA256
115e7f579b456e7ffe1b611eec0f1fc3223b1a564c230ccdae23eccaa5144c91
-
SHA512
7b2aaff22d07394b8a07484c03be473e3f108d3245fee663e5d6990e5c510490e35592bd45906373043a452b2891e610dcc06f0fa5ac313342610298a68e0b02
-
SSDEEP
1536:dv927G7dcJq4Ir36jXFEZbFo5q7NGf5EK8AMdjejx5bmWhnouy8km:V927gdcJ636jXFEZbRRdje9/Boutkm
Behavioral task
behavioral1
Sample
3899f16e30129406a4a0858f6f16c66c.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
3899f16e30129406a4a0858f6f16c66c.exe
-
Size
63KB
-
MD5
3899f16e30129406a4a0858f6f16c66c
-
SHA1
2bac48457a15908d400c06f8dff0ccf87ec4fc7e
-
SHA256
115e7f579b456e7ffe1b611eec0f1fc3223b1a564c230ccdae23eccaa5144c91
-
SHA512
7b2aaff22d07394b8a07484c03be473e3f108d3245fee663e5d6990e5c510490e35592bd45906373043a452b2891e610dcc06f0fa5ac313342610298a68e0b02
-
SSDEEP
1536:dv927G7dcJq4Ir36jXFEZbFo5q7NGf5EK8AMdjejx5bmWhnouy8km:V927gdcJ636jXFEZbRRdje9/Boutkm
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
3Modify Registry
13Subvert Trust Controls
1Install Root Certificate
1