General
-
Target
117658764c1ba53cd7070be85df5f43ffcb69c82a8d6bdd974f7c09d99846717
-
Size
770KB
-
Sample
240328-2xwwcaba7w
-
MD5
4b2d016a2c5149c6625b780ec6e5de14
-
SHA1
93dd8911cc99a46d56c6d05a0da0a2a409b48c5a
-
SHA256
117658764c1ba53cd7070be85df5f43ffcb69c82a8d6bdd974f7c09d99846717
-
SHA512
dd3c0733b9681bd5469489da8989ec759b69c4f56ac0b3c22bc45ad4cad212b9952951f08252543e2232c5a499501c8ee71a8e9517604a21e22ab31203a96f81
-
SSDEEP
24576:O7eit0t9EsyC1XS64DbvYwdzv1n4WwwS6u3sK:O7eimfEsr1X/4wwbn4Wpi
Static task
static1
Behavioral task
behavioral1
Sample
117658764c1ba53cd7070be85df5f43ffcb69c82a8d6bdd974f7c09d99846717.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
117658764c1ba53cd7070be85df5f43ffcb69c82a8d6bdd974f7c09d99846717.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
117658764c1ba53cd7070be85df5f43ffcb69c82a8d6bdd974f7c09d99846717
-
Size
770KB
-
MD5
4b2d016a2c5149c6625b780ec6e5de14
-
SHA1
93dd8911cc99a46d56c6d05a0da0a2a409b48c5a
-
SHA256
117658764c1ba53cd7070be85df5f43ffcb69c82a8d6bdd974f7c09d99846717
-
SHA512
dd3c0733b9681bd5469489da8989ec759b69c4f56ac0b3c22bc45ad4cad212b9952951f08252543e2232c5a499501c8ee71a8e9517604a21e22ab31203a96f81
-
SSDEEP
24576:O7eit0t9EsyC1XS64DbvYwdzv1n4WwwS6u3sK:O7eimfEsr1X/4wwbn4Wpi
Score8/10-
Downloads MZ/PE file
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1