General
-
Target
source_prepared.exe
-
Size
31.4MB
-
Sample
240823-zrnaxayarj
-
MD5
cd786939e0c71a1ccbc7cf4a23242302
-
SHA1
b079f07823b8aa2a3c6c776fa6e92666cac438e4
-
SHA256
1e3bf3be9ce62db6f578750f4c14d3c353a42f021a5a18819b0f30eb66e38414
-
SHA512
2f56602d528d189d634794b3011b91b6517e4da34a2e527fbaa8cfb1178dbf286f76daee0e53efd8d21f77e3c7e0ba228a4d626f4225ae0cd4c858660d1bd291
-
SSDEEP
786432:A9Z9HcYW8lh7vDadbZzcY876t9efK8vIM3VJOFKgiT9rhEv:ivHcYW0h7vGdRE7oES3MKonHE
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
31.4MB
-
MD5
cd786939e0c71a1ccbc7cf4a23242302
-
SHA1
b079f07823b8aa2a3c6c776fa6e92666cac438e4
-
SHA256
1e3bf3be9ce62db6f578750f4c14d3c353a42f021a5a18819b0f30eb66e38414
-
SHA512
2f56602d528d189d634794b3011b91b6517e4da34a2e527fbaa8cfb1178dbf286f76daee0e53efd8d21f77e3c7e0ba228a4d626f4225ae0cd4c858660d1bd291
-
SSDEEP
786432:A9Z9HcYW8lh7vDadbZzcY876t9efK8vIM3VJOFKgiT9rhEv:ivHcYW0h7vGdRE7oES3MKonHE
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1