General
-
Target
watch
-
Size
763KB
-
Sample
240909-2t82havbjm
-
MD5
355dce704cbbb456ccdead0de93935e1
-
SHA1
37fce09672e9262ab3755412b716f59cc7c93187
-
SHA256
788611be1e0382e629dd81fc1720c1ba44ce0b5021ef274031b98e323d1a9a47
-
SHA512
7df8080972514bc54a906b499e8e67af061279778f5601f5214c104814db00a8a05d58159393897a0128388b43d6242b9252e556ecab932bbdf85468e46e4441
-
SSDEEP
6144:+J8Gy3GyNGyEGy/GygGyEGy0GynGy3GyDPkmC6dbq4eGOPv3vt93nr3jHUGpIZh1:+6GOGGGXG2GvGXGhGKG8G2Pn49I
Static task
static1
Behavioral task
behavioral1
Sample
watch.html
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
watch
-
Size
763KB
-
MD5
355dce704cbbb456ccdead0de93935e1
-
SHA1
37fce09672e9262ab3755412b716f59cc7c93187
-
SHA256
788611be1e0382e629dd81fc1720c1ba44ce0b5021ef274031b98e323d1a9a47
-
SHA512
7df8080972514bc54a906b499e8e67af061279778f5601f5214c104814db00a8a05d58159393897a0128388b43d6242b9252e556ecab932bbdf85468e46e4441
-
SSDEEP
6144:+J8Gy3GyNGyEGy/GygGyEGy0GynGy3GyDPkmC6dbq4eGOPv3vt93nr3jHUGpIZh1:+6GOGGGXG2GvGXGhGKG8G2Pn49I
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1