General
-
Target
c46f1a56503f218c2977b4b42f5aa84b
-
Size
557KB
-
Sample
240312-3yhksagf28
-
MD5
c46f1a56503f218c2977b4b42f5aa84b
-
SHA1
25449ec8c765f94ffc284022374a9139dc46ebef
-
SHA256
144c0621ca5ecb402de01d8f10044f92a2ef917522e4b4955f3760bb17095bac
-
SHA512
b7cc796f0d6940f35a3495502a58bfa9a2f77f95afb41e136fd0431a39094ab88fe0be61ed9f6bcea3953e76fbe24912c0fb01b2019914e5a4284cbb1c1248f6
-
SSDEEP
6144:fx3+m6HONThlgxVlAwiGURZKgLaXEBXON3dTmwsXYXjxPkQv4RYj8yqrK2BhG0Oh:f8UPgKIgL0eOnTHscPmvOOp1beWNGxdF
Static task
static1
Behavioral task
behavioral1
Sample
c46f1a56503f218c2977b4b42f5aa84b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c46f1a56503f218c2977b4b42f5aa84b.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
c46f1a56503f218c2977b4b42f5aa84b
-
Size
557KB
-
MD5
c46f1a56503f218c2977b4b42f5aa84b
-
SHA1
25449ec8c765f94ffc284022374a9139dc46ebef
-
SHA256
144c0621ca5ecb402de01d8f10044f92a2ef917522e4b4955f3760bb17095bac
-
SHA512
b7cc796f0d6940f35a3495502a58bfa9a2f77f95afb41e136fd0431a39094ab88fe0be61ed9f6bcea3953e76fbe24912c0fb01b2019914e5a4284cbb1c1248f6
-
SSDEEP
6144:fx3+m6HONThlgxVlAwiGURZKgLaXEBXON3dTmwsXYXjxPkQv4RYj8yqrK2BhG0Oh:f8UPgKIgL0eOnTHscPmvOOp1beWNGxdF
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1