General

  • Target

    17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770.exe

  • Size

    930KB

  • Sample

    240809-bezamsxekf

  • MD5

    fdaef04ff6e9175a3a4918e83470903a

  • SHA1

    7cbe102ac7da79cb47adbe3d63c0206983a2fa67

  • SHA256

    17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770

  • SHA512

    e5810b5029c4c4b4ed7e724bf060e52179a5e6c59829adc92fd824088289a22926732925fb105efb716a5fc107d68ad09bd6d6cadf8d69fd29fb64e367531acb

  • SSDEEP

    24576:plzwyHNQcI5YGvm7gbi3Ziq+GYsROHzeGs2:pNw+eTvEhJ1OTB

Malware Config

Targets

    • Target

      17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770.exe

    • Size

      930KB

    • MD5

      fdaef04ff6e9175a3a4918e83470903a

    • SHA1

      7cbe102ac7da79cb47adbe3d63c0206983a2fa67

    • SHA256

      17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770

    • SHA512

      e5810b5029c4c4b4ed7e724bf060e52179a5e6c59829adc92fd824088289a22926732925fb105efb716a5fc107d68ad09bd6d6cadf8d69fd29fb64e367531acb

    • SSDEEP

      24576:plzwyHNQcI5YGvm7gbi3Ziq+GYsROHzeGs2:pNw+eTvEhJ1OTB

    • UAC bypass

    • Windows security bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Adds policy Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks