General
-
Target
414c8dd00b2ebfa8c70704e99a2789b0N.exe
-
Size
79KB
-
Sample
240719-c4qkgayerk
-
MD5
414c8dd00b2ebfa8c70704e99a2789b0
-
SHA1
ab539564dcf19f06f43cc2735b5296ccd1dbb652
-
SHA256
b92084c33bd7423c42f756717d2bf8fca3d20ec1b2af0f0fefcecffc9e8be13e
-
SHA512
078daae503d5d80f7ea773b583ccb0199a55763c4b57ca723aa6ec412b447ff7fe0dbb70b6e1781d9d02345ce483f1af9b80de3ef81f1e8f2001d68c65ff6e55
-
SSDEEP
1536:f++SLuEx8vhe9cyqjdSsaW8nzektcSsz35LNfLg+:CLmvyqBSFnjtS35LJ
Static task
static1
Behavioral task
behavioral1
Sample
414c8dd00b2ebfa8c70704e99a2789b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
414c8dd00b2ebfa8c70704e99a2789b0N.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
414c8dd00b2ebfa8c70704e99a2789b0N.exe
-
Size
79KB
-
MD5
414c8dd00b2ebfa8c70704e99a2789b0
-
SHA1
ab539564dcf19f06f43cc2735b5296ccd1dbb652
-
SHA256
b92084c33bd7423c42f756717d2bf8fca3d20ec1b2af0f0fefcecffc9e8be13e
-
SHA512
078daae503d5d80f7ea773b583ccb0199a55763c4b57ca723aa6ec412b447ff7fe0dbb70b6e1781d9d02345ce483f1af9b80de3ef81f1e8f2001d68c65ff6e55
-
SSDEEP
1536:f++SLuEx8vhe9cyqjdSsaW8nzektcSsz35LNfLg+:CLmvyqBSFnjtS35LJ
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6