General
-
Target
Install.exe
-
Size
162KB
-
Sample
240725-n7l71axepj
-
MD5
b05e31c3b9e6af68dcea0843167f7e70
-
SHA1
ae1d9f4e658d61e3d9325ad10032a92436e2adf0
-
SHA256
3f532d32ea2d79972e43613cc0c8cbcc67ca9cd07cc76176327507d6ff6a8c98
-
SHA512
6b5548c326db7850c4206672564a2f7fff5aca91e18e2ca46d5c4047f10fb7507a87a1b63f11bafa3c7160168521bd4bdd0190f964779161e04d7f66fafbafd3
-
SSDEEP
3072:WQpsrf7jq6uO5hfTXU3fjIqTbULcMmwAHVL6+C71mv/HiSHe3XoVrlkebmU:WQpsrf7jq6f5BTXU3c0VMm35C71wAoVR
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Install.exe
-
Size
162KB
-
MD5
b05e31c3b9e6af68dcea0843167f7e70
-
SHA1
ae1d9f4e658d61e3d9325ad10032a92436e2adf0
-
SHA256
3f532d32ea2d79972e43613cc0c8cbcc67ca9cd07cc76176327507d6ff6a8c98
-
SHA512
6b5548c326db7850c4206672564a2f7fff5aca91e18e2ca46d5c4047f10fb7507a87a1b63f11bafa3c7160168521bd4bdd0190f964779161e04d7f66fafbafd3
-
SSDEEP
3072:WQpsrf7jq6uO5hfTXU3fjIqTbULcMmwAHVL6+C71mv/HiSHe3XoVrlkebmU:WQpsrf7jq6f5BTXU3c0VMm35C71wAoVR
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2Pre-OS Boot
1Bootkit
1