General
-
Target
7850216edcd60c113621c5bf237f2f220cd46bf3f1266016a0197e342f24373e
-
Size
12.7MB
-
Sample
240523-rrdgpseb6y
-
MD5
aae56f19fc8319d8246b55167bbb7dfc
-
SHA1
2f7defd3b091f0bbc773e13751f135713f282edf
-
SHA256
7850216edcd60c113621c5bf237f2f220cd46bf3f1266016a0197e342f24373e
-
SHA512
104cbab242eed12b215a3786cc5d7795faed3ed3792b5d296a634ff48ec28571590a4af68f7139bfc09c9c0dee2821434faaf70a97231b72f434f49195451dd4
-
SSDEEP
196608:g07lhv4+zaZK4DT81o3LAKmP0R/7pS2E5RV9BYb3mnSdK/zvwpyFl1v6psjLm:z7zxzaZKt1o3IP0RsLRVk4fFl1v6pQ
Static task
static1
Behavioral task
behavioral1
Sample
7850216edcd60c113621c5bf237f2f220cd46bf3f1266016a0197e342f24373e.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7850216edcd60c113621c5bf237f2f220cd46bf3f1266016a0197e342f24373e.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
7850216edcd60c113621c5bf237f2f220cd46bf3f1266016a0197e342f24373e
-
Size
12.7MB
-
MD5
aae56f19fc8319d8246b55167bbb7dfc
-
SHA1
2f7defd3b091f0bbc773e13751f135713f282edf
-
SHA256
7850216edcd60c113621c5bf237f2f220cd46bf3f1266016a0197e342f24373e
-
SHA512
104cbab242eed12b215a3786cc5d7795faed3ed3792b5d296a634ff48ec28571590a4af68f7139bfc09c9c0dee2821434faaf70a97231b72f434f49195451dd4
-
SSDEEP
196608:g07lhv4+zaZK4DT81o3LAKmP0R/7pS2E5RV9BYb3mnSdK/zvwpyFl1v6psjLm:z7zxzaZKt1o3IP0RsLRVk4fFl1v6pQ
Score8/10-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Browser Extensions
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Change Default File Association
1