General
-
Target
87633eb6eeb7edd72ded8e33ef0c2920
-
Size
124KB
-
Sample
240201-t9ehtsccfm
-
MD5
87633eb6eeb7edd72ded8e33ef0c2920
-
SHA1
ec1e166039a14fedb584f04a50bca85af36f00fb
-
SHA256
1c896bcb561ed46a1b63bb55acdb1249d0f1151b415b54d57ece2a1a37ad712d
-
SHA512
3fd660edc3dd66780050e751fc830262c1adaa61611ee799927b427c595c0ce5f96f6a893669a2bd18c8652e0870deabda5e14968c91395e34e18de059ad78cc
-
SSDEEP
3072:GlhkajfwqM9F1DDmMtSNV5PuqLJsoUm9IYcsF+LnJ5d7q+:GXkajovDmMtSNVNSm9JinrV
Static task
static1
Behavioral task
behavioral1
Sample
87633eb6eeb7edd72ded8e33ef0c2920.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87633eb6eeb7edd72ded8e33ef0c2920.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
87633eb6eeb7edd72ded8e33ef0c2920
-
Size
124KB
-
MD5
87633eb6eeb7edd72ded8e33ef0c2920
-
SHA1
ec1e166039a14fedb584f04a50bca85af36f00fb
-
SHA256
1c896bcb561ed46a1b63bb55acdb1249d0f1151b415b54d57ece2a1a37ad712d
-
SHA512
3fd660edc3dd66780050e751fc830262c1adaa61611ee799927b427c595c0ce5f96f6a893669a2bd18c8652e0870deabda5e14968c91395e34e18de059ad78cc
-
SSDEEP
3072:GlhkajfwqM9F1DDmMtSNV5PuqLJsoUm9IYcsF+LnJ5d7q+:GXkajovDmMtSNVNSm9JinrV
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1