General
-
Target
zoomLive.zip
-
Size
3.7MB
-
Sample
240812-fst1aswhqn
-
MD5
dfe8ee7853f96dfac9291c25a5734867
-
SHA1
fd377e62e154204860ed5335b3cec981beea07f1
-
SHA256
92a6fd7de94ba8032291a2304c80595df03929b29f01a74e8fe163ec97df6a42
-
SHA512
c0c3d7cf44c6d66aefb135aa14684564de516df99f2d1c6246e880f2fe0552563aa7498a2ba68686526f587454c2cc05d1d9ddbf2e68ca7485b09413d218359e
-
SSDEEP
98304:cvnAq9lFkB0GXrtZXsH+EH3/0ZCEfyVLFXXptIt679LwsqzldV5Uk:cvAPBltlo+EX/KCxZStkLvqZT
Static task
static1
Behavioral task
behavioral1
Sample
4e81851729d58f321bb83bdb03200f62bc5ee56e0703b2d609a3923a033d5b53.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4e81851729d58f321bb83bdb03200f62bc5ee56e0703b2d609a3923a033d5b53.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
4e81851729d58f321bb83bdb03200f62bc5ee56e0703b2d609a3923a033d5b53
-
Size
5.2MB
-
MD5
0ed9b8e9f9b85a6af4946510f9299ff5
-
SHA1
51496e2d591117c094e163985b274e6ef947044c
-
SHA256
4e81851729d58f321bb83bdb03200f62bc5ee56e0703b2d609a3923a033d5b53
-
SHA512
1885905a2e1b0f47dedce304e219f629336c42e952c0d9f83eda1111e36ad1d882919465c9be397154c9ac39cc60d3190ce04121d3479840ee7c0b2e11654a9e
-
SSDEEP
98304:5ps6efPfBOPvLtabi4X0MV+dYdcGt7VIb4:zfefPJws3V+a
Score8/10-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1