General
-
Target
Winhost.zip
-
Size
1.1MB
-
Sample
240429-rp7b1acf87
-
MD5
7c3fca72375268f0b9129801ca140161
-
SHA1
2f51f3c96e9c94c849ae44816791bdff1d776c59
-
SHA256
0ab4136e7ea5cb294c593da40b368d327d77fd0e232adc9deb39e7daf5ade01f
-
SHA512
0dc256902bf28914e74b65059efea2427eb1a5e8c6c97a071c1b237d90586125ac6b732731c1b4e06c97b14a1322489ed7eb9d4fb4ccf7c1fd55db5855a8bf10
-
SSDEEP
24576:I7Mhd0Wi7fch0To7G6jV3l4uXg5jhuTAyjO9fTs7W3plmOa:wXzKG6XRXgJhusyo7ZQ
Static task
static1
Behavioral task
behavioral1
Sample
Winhost.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Winhost.exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
Winhost.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
Winhost.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
Winhost.dll
-
Size
1.0MB
-
MD5
99aa5444189f72f8f88a5b509390ce3c
-
SHA1
59653e399450e052686fe8746f021dcd15347a1a
-
SHA256
351b3e313df58ea5cc98be58c6df859aea392f60e8001fee12ab517aefd8ff7a
-
SHA512
d3899641a7f4271de9e56a013d05b71c2880b55bd3a6e43f6b0329f080530c698a065b4a6c3df9a2e3acebbeda4cf060066c7b519584868e717abbf42341861d
-
SSDEEP
24576:r5A5tpOMihhYhs5Wjo6jVblMu5kFvhsTuQJwFrHyzu:rIWBnio63V5kNhsaQYL
Score1/10 -
-
-
Target
Winhost.exe
-
Size
139KB
-
MD5
b046a025e8e53fbd316629125c687c3d
-
SHA1
5fc76dc221a4287b706ecc57834e7ed848d41a46
-
SHA256
bc18713902edd2f64cae8d04bf37b8545a10c7882e3d3b1fb6f26a677f27434c
-
SHA512
be05f7f721d11733172f91d9aad622a86917ccac0e28817ab54d28d13510654755f40a986300d3b823d91fa041ee806823704e3537b2e31dd9de144ac25f7895
-
SSDEEP
3072:uiS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJA8ltE:uiS4ompB9S3BZi0a1G78IVhcSct
Score10/10-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5