General
-
Target
NZP.exe
-
Size
103.4MB
-
Sample
240808-s4c75syhkf
-
MD5
66d7df10f82ac4a7a5021e305fb3a560
-
SHA1
774504d7ff3957a8d141d33b9a6fe9c8f8b15b9b
-
SHA256
8a46ee75e9ff83fca1310134751cedf8edac0ef10c9ce4656d368daebf4e0826
-
SHA512
ed2cbf821c8ad11bfc3b82b6a59297b4924491d7e979e3213043ca99e4b49053c66a47c0dfe3f316c646f357193691e2dd603c752bd7d170f092bfbb425390be
-
SSDEEP
3145728:pCOb8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWSs9U:DgSWNaIsHCiH1XcBWP
Behavioral task
behavioral1
Sample
NZP.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
NZP.exe
-
Size
103.4MB
-
MD5
66d7df10f82ac4a7a5021e305fb3a560
-
SHA1
774504d7ff3957a8d141d33b9a6fe9c8f8b15b9b
-
SHA256
8a46ee75e9ff83fca1310134751cedf8edac0ef10c9ce4656d368daebf4e0826
-
SHA512
ed2cbf821c8ad11bfc3b82b6a59297b4924491d7e979e3213043ca99e4b49053c66a47c0dfe3f316c646f357193691e2dd603c752bd7d170f092bfbb425390be
-
SSDEEP
3145728:pCOb8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWSs9U:DgSWNaIsHCiH1XcBWP
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1