General
-
Target
source_prepared.exe
-
Size
76.3MB
-
Sample
240823-axm5nawdma
-
MD5
f50428d3823f18fbc37929cf9d87d0be
-
SHA1
08bb03b975beeba3d8242b6abb216af1aa57c6cf
-
SHA256
000bd548da4592196272f1849df1262378252e0bfacb03c0239f6febcb5cfb01
-
SHA512
41a7e709587c5c211dd995a3a07a5d93ca84c30bf79a89a12cbf1fe472ecd984c3a5592bdd028bc6cf8750c9e13779fa391e9c53636aa42f6256226f24c6df87
-
SSDEEP
1572864:EvhQ6l+Wp7vqSk8IpG7V+VPhqP2E7WTElPDViY4MHHLeqPNLtD6jzPZPs9RH:Evh18sOSkB05awPOTE5WMHVLtOneRH
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
76.3MB
-
MD5
f50428d3823f18fbc37929cf9d87d0be
-
SHA1
08bb03b975beeba3d8242b6abb216af1aa57c6cf
-
SHA256
000bd548da4592196272f1849df1262378252e0bfacb03c0239f6febcb5cfb01
-
SHA512
41a7e709587c5c211dd995a3a07a5d93ca84c30bf79a89a12cbf1fe472ecd984c3a5592bdd028bc6cf8750c9e13779fa391e9c53636aa42f6256226f24c6df87
-
SSDEEP
1572864:EvhQ6l+Wp7vqSk8IpG7V+VPhqP2E7WTElPDViY4MHHLeqPNLtD6jzPZPs9RH:Evh18sOSkB05awPOTE5WMHVLtOneRH
-
Enumerates VirtualBox DLL files
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Discovery
Browser Information Discovery
1File and Directory Discovery
1Query Registry
5System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1