General
-
Target
e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a.exe
-
Size
2.9MB
-
Sample
240912-cflavavhnr
-
MD5
ee557be5d5e16d9ea01241f09a19a87b
-
SHA1
e83e01dca3b3684e4f417b85bb4172dc635377e8
-
SHA256
e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a
-
SHA512
1ec2e18ae64ad994b279c4778c85d17df40d8de889d04c312a24b5bdf70fe1696f926016cc10e891e0fc2b0811d8f89b86d593ed6ff7a96b2c83d489bc3e1ce9
-
SSDEEP
12288:sR2wFm7mveI0f0bA1n4ADwC8ZjE8E27hs4k2BX48gUaZczMAjiCrj:s9m7my0bA2ADw7E8H73I8gU0czL7j
Static task
static1
Behavioral task
behavioral1
Sample
e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a.exe
-
Size
2.9MB
-
MD5
ee557be5d5e16d9ea01241f09a19a87b
-
SHA1
e83e01dca3b3684e4f417b85bb4172dc635377e8
-
SHA256
e42b2065cd7683b0be8702853b309e09474f23ff67851cb8295686194006622a
-
SHA512
1ec2e18ae64ad994b279c4778c85d17df40d8de889d04c312a24b5bdf70fe1696f926016cc10e891e0fc2b0811d8f89b86d593ed6ff7a96b2c83d489bc3e1ce9
-
SSDEEP
12288:sR2wFm7mveI0f0bA1n4ADwC8ZjE8E27hs4k2BX48gUaZczMAjiCrj:s9m7my0bA2ADw7E8H73I8gU0czL7j
Score10/10-
Adds policy Run key to start application
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6