General
-
Target
Winhost.zip
-
Size
1.1MB
-
Sample
240429-rnkfvacf62
-
MD5
7d606aa88face6163ac6e1c1989e9ceb
-
SHA1
d100448d014695e44e43d402ba5c958889c61466
-
SHA256
cb63099a1b5f346c2d5f03e035df500de83eebbdf6549a605551ca8bf37774f4
-
SHA512
ebbb9b5864646392cabedb766aa5278533aac7d402f5d7b1cea4ae682294a8f45b9545205145cb18683d297f74d2842b176a1e907ed343743fa400043d36894b
-
SSDEEP
24576:o7Mhd0Wi7fch0To7G6jV3l4uXg5jhuTAyjO9fTs7W3IlmO0:QXzKG6XRXgJhusyo7Zt
Static task
static1
Behavioral task
behavioral1
Sample
Winhost.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Winhost.exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
Winhost.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
Winhost.dll
-
Size
1.0MB
-
MD5
b095ad31d55b7317ed0a4dfa02188da4
-
SHA1
374670f2775d82f1bb4ebb3baf35d7e4ba9cfc27
-
SHA256
e2c05ebcd648404c023232b61dc9ac5ec10df5eaf5c1e48d7ac3e53f0b6437ce
-
SHA512
e94a32c9832ae9d01e05ed29e82a675753e40d0ed89a2a9d1a265d2d6d690fdccc1d7041586d2f49488d63ba3afe4e03d7fe7731e2a7dc28c7bcdc03282004ac
-
SSDEEP
24576:q5A5tpOMihhYhs5Wjo6jVblMu5kFvhsTuQJwFrHyzu8:qIWBnio63V5kNhsaQYL
Score1/10 -
-
-
Target
Winhost.exe
-
Size
139KB
-
MD5
b046a025e8e53fbd316629125c687c3d
-
SHA1
5fc76dc221a4287b706ecc57834e7ed848d41a46
-
SHA256
bc18713902edd2f64cae8d04bf37b8545a10c7882e3d3b1fb6f26a677f27434c
-
SHA512
be05f7f721d11733172f91d9aad622a86917ccac0e28817ab54d28d13510654755f40a986300d3b823d91fa041ee806823704e3537b2e31dd9de144ac25f7895
-
SSDEEP
3072:uiS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJA8ltE:uiS4ompB9S3BZi0a1G78IVhcSct
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1