General
-
Target
source_prepared.exe
-
Size
103.0MB
-
Sample
240818-sc6qdaygjd
-
MD5
ce4a29ffe42cfa030dd86f2790717ed8
-
SHA1
1974f3d45130e0d8055a6b2f85778feebb401804
-
SHA256
c6bf772cfa85f5f83e051aab11bafe17e3bbd16372e9f8b77c71298652cccd1f
-
SHA512
fbf4cbf79d9a441454c012dd8592ae57e15a5a13c4f9d8c18f8908d36fd7ca8b8a5068d91bf91f477cd584d868ca2a8e8a8a8115df46eaf905465a8c8910158d
-
SSDEEP
3145728:WbCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB9aLr5Wo:WBgSWNa6sHCip1XcB9aL
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
103.0MB
-
MD5
ce4a29ffe42cfa030dd86f2790717ed8
-
SHA1
1974f3d45130e0d8055a6b2f85778feebb401804
-
SHA256
c6bf772cfa85f5f83e051aab11bafe17e3bbd16372e9f8b77c71298652cccd1f
-
SHA512
fbf4cbf79d9a441454c012dd8592ae57e15a5a13c4f9d8c18f8908d36fd7ca8b8a5068d91bf91f477cd584d868ca2a8e8a8a8115df46eaf905465a8c8910158d
-
SSDEEP
3145728:WbCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB9aLr5Wo:WBgSWNa6sHCip1XcB9aL
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1