General
-
Target
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
-
Size
3.5MB
-
Sample
240806-bskz6svdpr
-
MD5
8784f682b99ff4d525e623544ae67e24
-
SHA1
4bc752a2fbe5964b1cdfe57f62ab80531c181912
-
SHA256
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d
-
SHA512
08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf
-
SSDEEP
98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy
Static task
static1
Behavioral task
behavioral1
Sample
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
-
Size
3.5MB
-
MD5
8784f682b99ff4d525e623544ae67e24
-
SHA1
4bc752a2fbe5964b1cdfe57f62ab80531c181912
-
SHA256
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d
-
SHA512
08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf
-
SSDEEP
98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1