General
-
Target
55d8d7ede1e3f2f0e5137e4199b182c0N.exe
-
Size
8.0MB
-
Sample
240830-y22evatbrg
-
MD5
55d8d7ede1e3f2f0e5137e4199b182c0
-
SHA1
69fb9910794271e707b7584b04e075709e2a2a39
-
SHA256
53672acf950da3cee20f11595a35afbb3840c324ad2223552b282793e23c7f8f
-
SHA512
c680430898bea820c7290cbfeee7da406543682420a361cc33a3d01715961b027d35c012e1bc5b3c380a021a47622d3befedbbf40044ab0ffb0169a4c440ce46
-
SSDEEP
98304:0XZvnKYEUwMXKCGXZvnKYEUwMXKCgpFK0U8AmJNIo:0tnf3rXJGtnf3rXJWFKzYN
Static task
static1
Behavioral task
behavioral1
Sample
55d8d7ede1e3f2f0e5137e4199b182c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
55d8d7ede1e3f2f0e5137e4199b182c0N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
55d8d7ede1e3f2f0e5137e4199b182c0N.exe
-
Size
8.0MB
-
MD5
55d8d7ede1e3f2f0e5137e4199b182c0
-
SHA1
69fb9910794271e707b7584b04e075709e2a2a39
-
SHA256
53672acf950da3cee20f11595a35afbb3840c324ad2223552b282793e23c7f8f
-
SHA512
c680430898bea820c7290cbfeee7da406543682420a361cc33a3d01715961b027d35c012e1bc5b3c380a021a47622d3befedbbf40044ab0ffb0169a4c440ce46
-
SSDEEP
98304:0XZvnKYEUwMXKCGXZvnKYEUwMXKCgpFK0U8AmJNIo:0tnf3rXJGtnf3rXJWFKzYN
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1