General
-
Target
аываыва.exe
-
Size
1.7MB
-
Sample
240625-pygftszhkh
-
MD5
e883aa197df2a5c995a18dad90445a7c
-
SHA1
725be81650d3b8871e368cecdc075232f43bfb50
-
SHA256
bc2d054327e6af67215b4d20d58d81f36ab36181c90555e21f89159817a3a1c7
-
SHA512
7dfb1ca994700301fa5f8ee8d6424930871bcb5c36c313f1b9d183a629044f3db44165295ce4b63e88f72735bc3e71420396a0f73f4613d443f46ecddafe132b
-
SSDEEP
24576:2TbBv5rUyXVLtrDzJ8ZUZF79nxIc1k8HAPvh9TOCnyeek9+N2jCszEV1S2qxA:IBJJrUCZIc1k8HGTZSk8N2jCXVk2q6
Static task
static1
Behavioral task
behavioral1
Sample
аываыва.exe
Resource
win11-20240611-en
Malware Config
Targets
-
-
Target
аываыва.exe
-
Size
1.7MB
-
MD5
e883aa197df2a5c995a18dad90445a7c
-
SHA1
725be81650d3b8871e368cecdc075232f43bfb50
-
SHA256
bc2d054327e6af67215b4d20d58d81f36ab36181c90555e21f89159817a3a1c7
-
SHA512
7dfb1ca994700301fa5f8ee8d6424930871bcb5c36c313f1b9d183a629044f3db44165295ce4b63e88f72735bc3e71420396a0f73f4613d443f46ecddafe132b
-
SSDEEP
24576:2TbBv5rUyXVLtrDzJ8ZUZF79nxIc1k8HAPvh9TOCnyeek9+N2jCszEV1S2qxA:IBJJrUCZIc1k8HGTZSk8N2jCXVk2q6
Score10/10-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1