General
-
Target
ChromeSetup.exe
-
Size
8.5MB
-
Sample
240919-sc3cysvbne
-
MD5
919bf3c2f66a36c0980bf73220691ab0
-
SHA1
04ea003a184005e3a8795374898ca449ec74a59c
-
SHA256
30c59d9ddf6eb969ce93cb533f1f11a458ba7c4904e55dd781cbf09f58944595
-
SHA512
9101fc61646200640e934a200dc91f324fab36fb63821f89f4b338d9e0424230130ae73e6147ef4e5d2807c6150dc7409b4f31e16a5640b98e21002d0b24f06f
-
SSDEEP
196608:ZNWvMZmI8qx5AxLg+mB6qDVKrNo+RpPOSdeIZ5yH+7BzLZMYFnIwBxu330G:Za4Wqx5YLg+y/DVKrNoCPoIZ5I+7B/25
Static task
static1
Behavioral task
behavioral1
Sample
ChromeSetup.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ChromeSetup.exe
-
Size
8.5MB
-
MD5
919bf3c2f66a36c0980bf73220691ab0
-
SHA1
04ea003a184005e3a8795374898ca449ec74a59c
-
SHA256
30c59d9ddf6eb969ce93cb533f1f11a458ba7c4904e55dd781cbf09f58944595
-
SHA512
9101fc61646200640e934a200dc91f324fab36fb63821f89f4b338d9e0424230130ae73e6147ef4e5d2807c6150dc7409b4f31e16a5640b98e21002d0b24f06f
-
SSDEEP
196608:ZNWvMZmI8qx5AxLg+mB6qDVKrNo+RpPOSdeIZ5yH+7BzLZMYFnIwBxu330G:Za4Wqx5YLg+y/DVKrNoCPoIZ5I+7B/25
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1