General
-
Target
http://example.com
-
Sample
240625-azrwma1bmd
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://example.com
Resource
win7-20240508-en
windows7-x64
25 signatures
300 seconds
Malware Config
Targets
-
-
Target
http://example.com
Score10/10-
Modifies visibility of file extensions in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Screensaver
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Screensaver
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
6