General
-
Target
7e0244a8bc506ac34c494c55c52a03b5
-
Size
2.1MB
-
Sample
240128-zy939aaca5
-
MD5
7e0244a8bc506ac34c494c55c52a03b5
-
SHA1
60552dff2005084e18aa148ea1e865f5580d067d
-
SHA256
40d8d89e6aa8a95ed370d23588de5bf3601c650334986d8a222e4582be7c4ef5
-
SHA512
6cecdec9ed0dca6714e299be18043e932e5ed9a25c5018af56f5f7823a1ec46a50a735f933236fe6d70bc338effe5896daf838f8594559ebb02c4d0e9c81e45a
-
SSDEEP
49152:51vqjd/Qvq/AvCGVIBzES3kJy7qE6kDHfZ5:51vqjskOi0JUB5
Static task
static1
Behavioral task
behavioral1
Sample
7e0244a8bc506ac34c494c55c52a03b5.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
7e0244a8bc506ac34c494c55c52a03b5
-
Size
2.1MB
-
MD5
7e0244a8bc506ac34c494c55c52a03b5
-
SHA1
60552dff2005084e18aa148ea1e865f5580d067d
-
SHA256
40d8d89e6aa8a95ed370d23588de5bf3601c650334986d8a222e4582be7c4ef5
-
SHA512
6cecdec9ed0dca6714e299be18043e932e5ed9a25c5018af56f5f7823a1ec46a50a735f933236fe6d70bc338effe5896daf838f8594559ebb02c4d0e9c81e45a
-
SSDEEP
49152:51vqjd/Qvq/AvCGVIBzES3kJy7qE6kDHfZ5:51vqjskOi0JUB5
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5