General
-
Target
sample
-
Size
20KB
-
Sample
240503-wpbbsacd4s
-
MD5
61d5c30247c44511543dd943c4f5354a
-
SHA1
995064c6a682d27224cfaf0a9880dc3bd8daf0af
-
SHA256
e3599f54f097ae9350f4dfb3e1998d53447ee47f85e900f7f61884c0299333eb
-
SHA512
94ad4b2a357690fb98763e5ed0eede57d109d30af09c3142e1e81d8ec7abdab241a724c975e65aa79bf06e5938a01c49bce2f2983c74d30f83268d2fed12a49c
-
SSDEEP
384:rRuazhgDpmReVoOs4Oi9ylKeGMOU8HhhbKVgY7HS2LjMrSD+8IJCgMmVn:rQBVoOs4OmyI1MkBhbiNXMrS2J2mVn
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
sample
-
Size
20KB
-
MD5
61d5c30247c44511543dd943c4f5354a
-
SHA1
995064c6a682d27224cfaf0a9880dc3bd8daf0af
-
SHA256
e3599f54f097ae9350f4dfb3e1998d53447ee47f85e900f7f61884c0299333eb
-
SHA512
94ad4b2a357690fb98763e5ed0eede57d109d30af09c3142e1e81d8ec7abdab241a724c975e65aa79bf06e5938a01c49bce2f2983c74d30f83268d2fed12a49c
-
SSDEEP
384:rRuazhgDpmReVoOs4Oi9ylKeGMOU8HhhbKVgY7HS2LjMrSD+8IJCgMmVn:rQBVoOs4OmyI1MkBhbiNXMrS2J2mVn
Score10/10-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1