General
-
Target
IIMG_00172424.exe
-
Size
716KB
-
Sample
240724-hr38patcql
-
MD5
12357dcb00ad3f1bf0775ff13cf0084d
-
SHA1
28d9a79a4e18c87f4e76daa8da996e755cbf7850
-
SHA256
7ed9a3c3e7a0edc6a81e2b326832a8d3a27a192131861cbfc616d87e6eff642a
-
SHA512
cd26cba1a32f4b0a9dc15baf6eee7c5d2a3943e8a7f65bbd5e6dc69747bf3edaef38af6aa2be832939a9bd16b762e0dc8ad85e3ee707fc311e5cad8c7c473126
-
SSDEEP
12288:GuCSY+aZrwra6Cgrdm8Kyjlp3432YCdMi2s/PlEkJQ40bPscBy5z43yFJ0tlYB:4/4ra6CIm8KqfzIe3JQ40TtBqkCFJ0t
Static task
static1
Behavioral task
behavioral1
Sample
IIMG_00172424.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
IIMG_00172424.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
IIMG_00172424.exe
-
Size
716KB
-
MD5
12357dcb00ad3f1bf0775ff13cf0084d
-
SHA1
28d9a79a4e18c87f4e76daa8da996e755cbf7850
-
SHA256
7ed9a3c3e7a0edc6a81e2b326832a8d3a27a192131861cbfc616d87e6eff642a
-
SHA512
cd26cba1a32f4b0a9dc15baf6eee7c5d2a3943e8a7f65bbd5e6dc69747bf3edaef38af6aa2be832939a9bd16b762e0dc8ad85e3ee707fc311e5cad8c7c473126
-
SSDEEP
12288:GuCSY+aZrwra6Cgrdm8Kyjlp3432YCdMi2s/PlEkJQ40bPscBy5z43yFJ0tlYB:4/4ra6CIm8KqfzIe3JQ40TtBqkCFJ0t
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Persistence
Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1