General
-
Target
ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a.msi
-
Size
7.3MB
-
Sample
240823-cyj6ha1ble
-
MD5
6086601a8560a2037f5091d8632d0509
-
SHA1
2a7203ea36b649e95f42a2cf0fcf38347d0a7640
-
SHA256
ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a
-
SHA512
554fb256c1be49942c3c1b2cf1620c8d364a9fa52de7471808ba282019f87703980c9213045123fa5406916bc2e6e60fe963950d4916c622b1edd1f14032864a
-
SSDEEP
98304:HAMvSQwxDnl2dYds9GLIeDT3OF6zfAMvSQwxDnl2dYdsTAMvSQwxDnl2dYdsbAMF:bnEPDT3wAn/nHn
Static task
static1
Behavioral task
behavioral1
Sample
ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a.msi
-
Size
7.3MB
-
MD5
6086601a8560a2037f5091d8632d0509
-
SHA1
2a7203ea36b649e95f42a2cf0fcf38347d0a7640
-
SHA256
ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a
-
SHA512
554fb256c1be49942c3c1b2cf1620c8d364a9fa52de7471808ba282019f87703980c9213045123fa5406916bc2e6e60fe963950d4916c622b1edd1f14032864a
-
SSDEEP
98304:HAMvSQwxDnl2dYds9GLIeDT3OF6zfAMvSQwxDnl2dYdsTAMvSQwxDnl2dYdsbAMF:bnEPDT3wAn/nHn
Score8/10-
Sets service image path in registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1