General
-
Target
https://cdn.discordapp.com/attachments/1215494598412075028/1235690984004653096/WA_Exploit_v1.2.zip?ex=66369be8&is=66354a68&hm=e5d274c66e5f7684bb25031fa5bc0a8c33ab78665ecee6ac8277c5df83e5ff6e&
-
Sample
240504-hby9sshe46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1215494598412075028/1235690984004653096/WA_Exploit_v1.2.zip?ex=66369be8&is=66354a68&hm=e5d274c66e5f7684bb25031fa5bc0a8c33ab78665ecee6ac8277c5df83e5ff6e&
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1215494598412075028/1235690984004653096/WA_Exploit_v1.2.zip?ex=66369be8&is=66354a68&hm=e5d274c66e5f7684bb25031fa5bc0a8c33ab78665ecee6ac8277c5df83e5ff6e&
Score8/10-
Downloads MZ/PE file
-
Sets file execution options in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-