General
-
Target
si9B7KU.exe
-
Size
4.5MB
-
Sample
240903-em43mswfnl
-
MD5
4110441bcce6304b69e739b0205f16cd
-
SHA1
3ab71b81c77a79e699b2e95c016ffd4f8eb529ce
-
SHA256
7c720f30648e25e80bd2d9c1e294cf0511fa9a9bc888c1c454c02a6d753e9344
-
SHA512
13a140666ebc63862d3cc66974e832fd660ea5c90b42575febf9724a925e907a82cce5ef7ea710896f954d65b6e5b4cf93a7cebddda0af12dfd472421ced5456
-
SSDEEP
98304:6YvxtyWyN1meRwiWD/gWguWoI2J783U5FsC3LDbkm:dbmmdiWfgxoIvC7Dom
Static task
static1
Behavioral task
behavioral1
Sample
si9B7KU.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
si9B7KU.exe
-
Size
4.5MB
-
MD5
4110441bcce6304b69e739b0205f16cd
-
SHA1
3ab71b81c77a79e699b2e95c016ffd4f8eb529ce
-
SHA256
7c720f30648e25e80bd2d9c1e294cf0511fa9a9bc888c1c454c02a6d753e9344
-
SHA512
13a140666ebc63862d3cc66974e832fd660ea5c90b42575febf9724a925e907a82cce5ef7ea710896f954d65b6e5b4cf93a7cebddda0af12dfd472421ced5456
-
SSDEEP
98304:6YvxtyWyN1meRwiWD/gWguWoI2J783U5FsC3LDbkm:dbmmdiWfgxoIvC7Dom
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1