General
-
Target
source_prepared.exe
-
Size
78.5MB
-
Sample
240808-bkpcmaxdpk
-
MD5
95caab762dde6db5ca9b5e7663f95261
-
SHA1
09e7fff93234160fa235f8f72d6c1a1b8a6c8ab7
-
SHA256
7d033702e497b4d560698a2081e903cc309f5b2582dde8ae33d572fe17e456f5
-
SHA512
851c8b7a7f5e9d47a22aae7114ef87dd8bc6d2ef15a058beb84716e4979e5a3cd547610a0f2a2f08a7d6ef67b3f5c1dd3b6821d022a5544c9ccdc46453f449f3
-
SSDEEP
1572864:CpvHcRlPsh7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW41Gj7+hL:CpvHcRehTSkB05awqfhdCpukdR1ThL
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
78.5MB
-
MD5
95caab762dde6db5ca9b5e7663f95261
-
SHA1
09e7fff93234160fa235f8f72d6c1a1b8a6c8ab7
-
SHA256
7d033702e497b4d560698a2081e903cc309f5b2582dde8ae33d572fe17e456f5
-
SHA512
851c8b7a7f5e9d47a22aae7114ef87dd8bc6d2ef15a058beb84716e4979e5a3cd547610a0f2a2f08a7d6ef67b3f5c1dd3b6821d022a5544c9ccdc46453f449f3
-
SSDEEP
1572864:CpvHcRlPsh7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW41Gj7+hL:CpvHcRehTSkB05awqfhdCpukdR1ThL
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1