General
-
Target
240522-t14flahc41-behavioral1.pcap
-
Size
6.5MB
-
Sample
240522-t91fashe8t
-
MD5
c719628113586541710931c2a0daad28
-
SHA1
3d30ebc75dc3e5f4d17841e9eadf20565d878b5b
-
SHA256
9ad9f21ec1538978e896317756689c1b02b84d645a2f7c9c05416a7d2033b3ab
-
SHA512
6f852f8276bed2743de85ca3583179061747bf31459dd53984871d25844c6b03ffa3ff9d227afe526621accd936cbc8f66d69745f11b52653c6bc46d23287f2d
-
SSDEEP
98304:pgmP+J5+GBoKNxTbSww87tjM76kGQxfC+lcWZ+XnRojo7V/UuUrudMsS6vA4uuLT:/Ps3GmnFToNWG+3dB/UptOA4uYY2
Static task
static1
Behavioral task
behavioral1
Sample
240522-t14flahc41-behavioral1.pcap
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
240522-t14flahc41-behavioral1.pcap
-
Size
6.5MB
-
MD5
c719628113586541710931c2a0daad28
-
SHA1
3d30ebc75dc3e5f4d17841e9eadf20565d878b5b
-
SHA256
9ad9f21ec1538978e896317756689c1b02b84d645a2f7c9c05416a7d2033b3ab
-
SHA512
6f852f8276bed2743de85ca3583179061747bf31459dd53984871d25844c6b03ffa3ff9d227afe526621accd936cbc8f66d69745f11b52653c6bc46d23287f2d
-
SSDEEP
98304:pgmP+J5+GBoKNxTbSww87tjM76kGQxfC+lcWZ+XnRojo7V/UuUrudMsS6vA4uuLT:/Ps3GmnFToNWG+3dB/UptOA4uYY2
Score8/10-
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Modifies file permissions
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1