General
-
Target
right-arrow.svg
-
Size
942B
-
Sample
240624-pmqv5asaqa
-
MD5
082515300dff3450faa8780515be7d49
-
SHA1
5c26504a54ba6d7c9dd2b4eeb3c2b4232a4af9b1
-
SHA256
a95a3d988edb17d894e845c6b4055e59ed773bd2d7e10bdea43a9de3bb498100
-
SHA512
c35a439b2a0232336c821c6bb883936b71d92ef58b1698b605069577fa81bfb444a6b1c40084d6b6585ca4f961b5e3a5bb5fa8c39988dd17a53ebbcef326abc6
Static task
static1
Behavioral task
behavioral1
Sample
right-arrow.xml
Resource
win11-20240611-en
Malware Config
Extracted
socks5systemz
youtube.com
Targets
-
-
Target
right-arrow.svg
-
Size
942B
-
MD5
082515300dff3450faa8780515be7d49
-
SHA1
5c26504a54ba6d7c9dd2b4eeb3c2b4232a4af9b1
-
SHA256
a95a3d988edb17d894e845c6b4055e59ed773bd2d7e10bdea43a9de3bb498100
-
SHA512
c35a439b2a0232336c821c6bb883936b71d92ef58b1698b605069577fa81bfb444a6b1c40084d6b6585ca4f961b5e3a5bb5fa8c39988dd17a53ebbcef326abc6
-
Detect Socks5Systemz Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1