General
-
Target
f8c828f938d4ed21c3c0d69a1c9211e4.zip
-
Size
28KB
-
Sample
240903-agyapa1emp
-
MD5
592cf5826f5146d55c28c324263b5985
-
SHA1
b0a6f825b4967ad8ab2128c663e121b834f8e041
-
SHA256
5b570a3df3a2f0a54427482b5280b343d74d9ab555e17ee4017ae065997929c8
-
SHA512
c1192c6003aa1f65c174f37e494a6fbb67c822d50026da4feff80b03ee61b29f6e84f78e99e5be4882248790eeb4184b4b7bce8ac8bc608922f22f9ca62b4b91
-
SSDEEP
768:7P1AmO47ZnuqJY/wYsLwahYAGkG7KQcmny:7NFOuewYOYl+rmy
Behavioral task
behavioral1
Sample
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47
-
Size
33KB
-
MD5
f8c828f938d4ed21c3c0d69a1c9211e4
-
SHA1
198636a32191acc85071a8ef4ad77dbd2f08c3da
-
SHA256
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47
-
SHA512
82f546ad372f6c093bd4881435f79a368320a2e6952fbbad83f69c0d193df79418a2464198db2aaebd036c681944ea01139aa27e9698ee61dee337039c09c5f4
-
SSDEEP
768:UEzNbLcQ9qQuVriDMuyuruTD0qB77777J77c77c77c7nOT1g:l3h9qQA6hZunrB77777J77c77c77c7O+
Score10/10-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1