General
-
Target
sample
-
Size
247KB
-
Sample
240807-k5w3mswelm
-
MD5
d2b9348deeb60e5ff1aaba8cc7be961e
-
SHA1
fbb9429362e0b27654b62932bcb3cb1601fd766c
-
SHA256
117409b4de58f9ea7cfb754a77074c6c2795f272c4d33ceea290c3e33224ec33
-
SHA512
f3f32eb927607d8755cecec609ec9e1d29f647c90cb5f1644fcf02165b08ec3da930a13e963cbffc5a97d40138d8a2073f88d3abbc5bb263615016ad6cf168e3
-
SSDEEP
6144:dOz1cC0c3uokeOvHS1d1+sNs8wbiWQ39rvZJT3CqbMrhryf65NRPaCieMjAkvCJP:Ez1cC0c3uokeOvHS1d1+sNs8wbiWQ39a
Static task
static1
Behavioral task
behavioral1
Sample
sample
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
sample
-
Size
247KB
-
MD5
d2b9348deeb60e5ff1aaba8cc7be961e
-
SHA1
fbb9429362e0b27654b62932bcb3cb1601fd766c
-
SHA256
117409b4de58f9ea7cfb754a77074c6c2795f272c4d33ceea290c3e33224ec33
-
SHA512
f3f32eb927607d8755cecec609ec9e1d29f647c90cb5f1644fcf02165b08ec3da930a13e963cbffc5a97d40138d8a2073f88d3abbc5bb263615016ad6cf168e3
-
SSDEEP
6144:dOz1cC0c3uokeOvHS1d1+sNs8wbiWQ39rvZJT3CqbMrhryf65NRPaCieMjAkvCJP:Ez1cC0c3uokeOvHS1d1+sNs8wbiWQ39a
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1