General
-
Target
Recording 2024-07-05 120024.mp4
-
Size
7.0MB
-
Sample
240705-s2d2na1cjl
-
MD5
ca6bacbede222729f52a59a47245e51b
-
SHA1
dbdef42f1ddd48c08ed226cb31661649d398b984
-
SHA256
5d1eaa39b85337b3e6d5a6c2d0977dbd750cfb4aa5ed0d02ea47702c3042e7c5
-
SHA512
4fb1e078e268c7a7499f07892ad14bb1d8762ac79518850eb688a5e6fedbcbcf331a5a583f4f86eb9c4c83d443dfd2b1ce2f926caabd8a4bdb8634a448b6781e
-
SSDEEP
98304:Rx4A59rW9ci/dnenqSFBplIwazug9iNJS1IANZFXzHdy2btXiVbaFCe4:RxXy9ynt7lDacS1dNZiy5Ob7n
Static task
static1
Behavioral task
behavioral1
Sample
Recording 2024-07-05 120024.mp4
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Recording 2024-07-05 120024.mp4
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Recording 2024-07-05 120024.mp4
-
Size
7.0MB
-
MD5
ca6bacbede222729f52a59a47245e51b
-
SHA1
dbdef42f1ddd48c08ed226cb31661649d398b984
-
SHA256
5d1eaa39b85337b3e6d5a6c2d0977dbd750cfb4aa5ed0d02ea47702c3042e7c5
-
SHA512
4fb1e078e268c7a7499f07892ad14bb1d8762ac79518850eb688a5e6fedbcbcf331a5a583f4f86eb9c4c83d443dfd2b1ce2f926caabd8a4bdb8634a448b6781e
-
SSDEEP
98304:Rx4A59rW9ci/dnenqSFBplIwazug9iNJS1IANZFXzHdy2btXiVbaFCe4:RxXy9ynt7lDacS1dNZiy5Ob7n
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1