General
-
Target
9c899ce4d925085b8ee3ac8d0a2b9.exe
-
Size
29.4MB
-
Sample
240920-3djmcathpk
-
MD5
9631249af30d669ed934b55a762388f8
-
SHA1
cb9ad04949cbaebb4e58199804dc56171a80bc9f
-
SHA256
760cb0f7e41eb9666c293e728702792698198d8c715d71bccb327115e5b37858
-
SHA512
43dbf701d4533db008bc89d2adda673bfe732c8adf86986be7568086e037a3b87f371537b6c0e0f020b651462e17f39e9cf3fa833ecdfddc9da04df4b47ac187
-
SSDEEP
786432:agxUHZJz7EzohbhFMBGVKvz9MmsFq/2XCppwc:EZd6ghCfhwFq/6Cppwc
Static task
static1
Behavioral task
behavioral1
Sample
9c899ce4d925085b8ee3ac8d0a2b9.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
9c899ce4d925085b8ee3ac8d0a2b9.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
9c899ce4d925085b8ee3ac8d0a2b9.exe
-
Size
29.4MB
-
MD5
9631249af30d669ed934b55a762388f8
-
SHA1
cb9ad04949cbaebb4e58199804dc56171a80bc9f
-
SHA256
760cb0f7e41eb9666c293e728702792698198d8c715d71bccb327115e5b37858
-
SHA512
43dbf701d4533db008bc89d2adda673bfe732c8adf86986be7568086e037a3b87f371537b6c0e0f020b651462e17f39e9cf3fa833ecdfddc9da04df4b47ac187
-
SSDEEP
786432:agxUHZJz7EzohbhFMBGVKvz9MmsFq/2XCppwc:EZd6ghCfhwFq/6Cppwc
-
Modifies visiblity of hidden/system files in Explorer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3