General
-
Target
9872f0e3187793537196c5f72e37e856d97bfb41132f235ecd8e2b42295ca919
-
Size
1.6MB
-
Sample
240831-bb5y1swhkl
-
MD5
14ecf0ae5b49126d7af528aa6e7f572b
-
SHA1
b1e7f40ddc7aba7f5828f8a7c7c00f01a5cb98d3
-
SHA256
9872f0e3187793537196c5f72e37e856d97bfb41132f235ecd8e2b42295ca919
-
SHA512
43a096543fb1cb4009c6e9f96fc099a164b08a3f0c5427f652b4932adb0d13834cc77ab66eccc09d9ac04a485f340625c6b4266cce2da2f783bd84e2f76cfda4
-
SSDEEP
24576:9q1JxhM8HfScM0yxot8dK6scZM8Z7BnlVE5HEvkqVZ44KtTgxl0tEAfiTbOS1WP5:8TMgMdxoApZ7vVgkvvD4RdcWfL
Behavioral task
behavioral1
Sample
15283d2cb10c0b9eb9d7ebfc46edff1c75dff0c75d03aa1122033682cbf9edc0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
15283d2cb10c0b9eb9d7ebfc46edff1c75dff0c75d03aa1122033682cbf9edc0.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
15283d2cb10c0b9eb9d7ebfc46edff1c75dff0c75d03aa1122033682cbf9edc0
-
Size
2.8MB
-
MD5
412e7cfb2c0b0496d332ce509b1e7e93
-
SHA1
65f8d7d3c0ec339c8fd304deaba9f73a3c61b559
-
SHA256
15283d2cb10c0b9eb9d7ebfc46edff1c75dff0c75d03aa1122033682cbf9edc0
-
SHA512
65be225bc854a700bb90032c2e5e00e3e2c9e6467c27981bb266384718e8e89fc3b502f4a7f87714a021801a825711decbecf66268521a578cdae90b27c2d37a
-
SSDEEP
49152:67N1ahC80V7N1ahCu0V7N1ahC50V7N1ahCW0:67p7b7s7
Score10/10-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1