General
-
Target
Patch Professional.exe
-
Size
92KB
-
Sample
240203-x8zddsgff3
-
MD5
cd413b74c3e28583f6e55054a5a951aa
-
SHA1
fc05e2b575af334a130e136b23192e729c4f904f
-
SHA256
014debdd2c64388d46996a2fb3734f89593af1c6643e3902b83e46323388d408
-
SHA512
c1352b14e9c4e6818ec68a3fdcbae43028ccb0a37e4a2f32c3b10856300676233132f9db3fb544dda783199d281c5b87df0853e20547990a874df45202ac31d8
-
SSDEEP
1536:zi4iekw62derNaFOmd9excKkGbVAK5/j/5J/lILTWHzsiAgAF:Oekw6dAFBd9excKkMV9D5J/lI3WHzsxT
Static task
static1
Behavioral task
behavioral1
Sample
Patch Professional.exe
Resource
win11-20231215-en
Malware Config
Targets
-
-
Target
Patch Professional.exe
-
Size
92KB
-
MD5
cd413b74c3e28583f6e55054a5a951aa
-
SHA1
fc05e2b575af334a130e136b23192e729c4f904f
-
SHA256
014debdd2c64388d46996a2fb3734f89593af1c6643e3902b83e46323388d408
-
SHA512
c1352b14e9c4e6818ec68a3fdcbae43028ccb0a37e4a2f32c3b10856300676233132f9db3fb544dda783199d281c5b87df0853e20547990a874df45202ac31d8
-
SSDEEP
1536:zi4iekw62derNaFOmd9excKkGbVAK5/j/5J/lILTWHzsiAgAF:Oekw6dAFBd9excKkMV9D5J/lI3WHzsxT
Score8/10-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Change Default File Association
1