General
-
Target
uacbypass.exe
-
Size
7.9MB
-
Sample
240605-q78gcahh55
-
MD5
088f6dbc8605dcb7a3cb961a69d90455
-
SHA1
c31b62c5853b99a40a61dab67cf5e8c5982415f7
-
SHA256
90019a54d4c74be63389f474ecf6660c2e453166ebc183ff3b79d17b8c3932f6
-
SHA512
a6bbf6c9a77cf8670481022d14f5bbf10fca49419034802b2a9c33509fe2398b38491de12f59d1276e696a02038ae2cd345c3cbbf0214d4d3ac7dec8beb0a764
-
SSDEEP
196608:Ts2ghQA1HeT39IigheE9TFa0Z8DOjCdylVSErSQyd8oD:mp1+TtIibY9Z8D8Cclso5GD
Behavioral task
behavioral1
Sample
uacbypass.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
uacbypass.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uacbypass.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
uacbypass.exe
-
Size
7.9MB
-
MD5
088f6dbc8605dcb7a3cb961a69d90455
-
SHA1
c31b62c5853b99a40a61dab67cf5e8c5982415f7
-
SHA256
90019a54d4c74be63389f474ecf6660c2e453166ebc183ff3b79d17b8c3932f6
-
SHA512
a6bbf6c9a77cf8670481022d14f5bbf10fca49419034802b2a9c33509fe2398b38491de12f59d1276e696a02038ae2cd345c3cbbf0214d4d3ac7dec8beb0a764
-
SSDEEP
196608:Ts2ghQA1HeT39IigheE9TFa0Z8DOjCdylVSErSQyd8oD:mp1+TtIibY9Z8D8Cclso5GD
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-