General
-
Target
Microsoft_crypt.exe
-
Size
2.7MB
-
Sample
240520-lg9jhaeb7v
-
MD5
6daeeadf00855bb08838f08c38c70f37
-
SHA1
c03525bd823f27a3e2acb8fe95f77d73327aca9d
-
SHA256
109dab92d97421b95132798bcb3fbd2f0194d52426601fe21f1f1d0e77431bd7
-
SHA512
7b8213e2fa44edb2e1999b17e199e6f72f048129879d4eb5d1a9d2cb6bf207adc7de9596aa5e6a58a56fa5ad74fe88a8cd7cb79c2176170b7ca061bb2983f61f
-
SSDEEP
49152:lxJhUIEUjke9UjgcwX4ZKqg2OPf6nAPM0NJ7w4U5i3pMFadI8qKq2LIj680f1ZT4:lZIgUjbwIZzQiA08J7w/i32MC89mj68h
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft_crypt.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Microsoft_crypt.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
Microsoft_crypt.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Microsoft_crypt.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Microsoft_crypt.exe
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
Microsoft_crypt.exe
-
Size
2.7MB
-
MD5
6daeeadf00855bb08838f08c38c70f37
-
SHA1
c03525bd823f27a3e2acb8fe95f77d73327aca9d
-
SHA256
109dab92d97421b95132798bcb3fbd2f0194d52426601fe21f1f1d0e77431bd7
-
SHA512
7b8213e2fa44edb2e1999b17e199e6f72f048129879d4eb5d1a9d2cb6bf207adc7de9596aa5e6a58a56fa5ad74fe88a8cd7cb79c2176170b7ca061bb2983f61f
-
SSDEEP
49152:lxJhUIEUjke9UjgcwX4ZKqg2OPf6nAPM0NJ7w4U5i3pMFadI8qKq2LIj680f1ZT4:lZIgUjbwIZzQiA08J7w/i32MC89mj68h
Score10/10-
Modifies security service
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3