General
-
Target
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
-
Size
9.1MB
-
Sample
240821-ff9j8a1are
-
MD5
05faaa16e93b89eac5f58ca9d7bb0530
-
SHA1
289ceb53db0cd28e259d398df04eebfe62563dcd
-
SHA256
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6
-
SHA512
f371bb76f4718f54e4485b5bcc5df49fa25afcf4d7da0af4a96ab3ffd4e3d818e2093eb0c946613f4c9028e3269b9c8e843f5ee59dc85e7209e9c3b4079b1254
-
SSDEEP
196608:EdBFFhL/RErGO/zcepY3EDhKRuJZYYE1H/0zRS:MBFFhL/RErGO4eMJ4JZY/Mz
Static task
static1
Behavioral task
behavioral1
Sample
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
-
Size
9.1MB
-
MD5
05faaa16e93b89eac5f58ca9d7bb0530
-
SHA1
289ceb53db0cd28e259d398df04eebfe62563dcd
-
SHA256
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6
-
SHA512
f371bb76f4718f54e4485b5bcc5df49fa25afcf4d7da0af4a96ab3ffd4e3d818e2093eb0c946613f4c9028e3269b9c8e843f5ee59dc85e7209e9c3b4079b1254
-
SSDEEP
196608:EdBFFhL/RErGO/zcepY3EDhKRuJZYYE1H/0zRS:MBFFhL/RErGO4eMJ4JZY/Mz
Score10/10-
Modifies security service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1Virtualization/Sandbox Evasion
2