General
-
Target
70b59e224a9f85eb673cbed862d4b56e.zip
-
Size
331KB
-
Sample
240903-h1mx3a1anr
-
MD5
9824e9a84084d90f70e48e3cb92c3fa7
-
SHA1
51e415dd25e0475689d3f2ecfa0b2d5ba4316cda
-
SHA256
f92113306c09b4be2e5366bda53e3d1be417aaa40768abd3de82776791fcb197
-
SHA512
22b0823f1f323ecc4b226acba75e26c043c907c2c9d8f41e952938c277b338880a8c2bd5cb3d6b99d9c73986c372c8a02f6aee81bdb8d0d181157a9e14457fcb
-
SSDEEP
6144:dSopBrYBgxUBfdGjHlKVXS6LW2em1w+PscN7IF0YwvUMmlwugfM36uClbaCp4INO:wuBrYBgaur2S6VeMw+PgPw8HlwZq4O
Behavioral task
behavioral1
Sample
100161df0841b00329913fa35a055ce77e448ad16eca5f3dc49a47c4c346bcf1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
100161df0841b00329913fa35a055ce77e448ad16eca5f3dc49a47c4c346bcf1.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
100161df0841b00329913fa35a055ce77e448ad16eca5f3dc49a47c4c346bcf1
-
Size
334KB
-
MD5
70b59e224a9f85eb673cbed862d4b56e
-
SHA1
afee4d3a726a27616b719b3d23d1238080b08614
-
SHA256
100161df0841b00329913fa35a055ce77e448ad16eca5f3dc49a47c4c346bcf1
-
SHA512
0ded8ba770d4589010003f4cef7d12c74dbc359810974be8898850488a7c0d44fdd97f8ce0770c4ad45879b96339454490a6d29497fd868aacf6da396c21d3a7
-
SSDEEP
6144:SqSp5zrtkD9mJn9ZBWeK6JKJqxE+18Vo4a9EfZUohIloVm4/eTQ1z:SqYg9mzBM/CR9EfZ5hH1Mk
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1