General
-
Target
77e6c7a792be005f0e175a2033482a21b976e02eae89d411a5265989b715c1d4
-
Size
2.5MB
-
Sample
240429-26ey7adc57
-
MD5
893b240449f6e149204c55423faee5b9
-
SHA1
80428db628f6031cbf05bec0e90069de0f0512ab
-
SHA256
77e6c7a792be005f0e175a2033482a21b976e02eae89d411a5265989b715c1d4
-
SHA512
ff7b0a05250d61084626a2d648921fd5c8656026c915ed7331f13b72cd744b8ebed6e15bca434704dcadc029f6b4c454d7fa4032f3b1062db06234fd60721670
-
SSDEEP
49152:9xmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxF:9xx9NUFkQx753uWuCyyxF
Behavioral task
behavioral1
Sample
77e6c7a792be005f0e175a2033482a21b976e02eae89d411a5265989b715c1d4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77e6c7a792be005f0e175a2033482a21b976e02eae89d411a5265989b715c1d4.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
77e6c7a792be005f0e175a2033482a21b976e02eae89d411a5265989b715c1d4
-
Size
2.5MB
-
MD5
893b240449f6e149204c55423faee5b9
-
SHA1
80428db628f6031cbf05bec0e90069de0f0512ab
-
SHA256
77e6c7a792be005f0e175a2033482a21b976e02eae89d411a5265989b715c1d4
-
SHA512
ff7b0a05250d61084626a2d648921fd5c8656026c915ed7331f13b72cd744b8ebed6e15bca434704dcadc029f6b4c454d7fa4032f3b1062db06234fd60721670
-
SSDEEP
49152:9xmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxF:9xx9NUFkQx753uWuCyyxF
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Detects executables packed with Themida
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1