General
-
Target
reset.bat
-
Size
2KB
-
Sample
240920-avz2fazala
-
MD5
f923fafd8c7c34387a9e71ffd0e1ad3d
-
SHA1
81827e222c0115e054c74d0c7718a98cc554d849
-
SHA256
87de37590bb74823203e44a5dedd6038316c3aae1f7a8c02493c40a896382d5f
-
SHA512
785258115d8adc38e95aa4cf548d588281bfded3428bb15a34e910c6e85ab01fbb79172c12ee9f51246d1db2246a2ff027a75618a0b08f614f04749c3c0fc3ab
Static task
static1
Behavioral task
behavioral1
Sample
reset.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
reset.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
reset.bat
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
reset.bat
-
Size
2KB
-
MD5
f923fafd8c7c34387a9e71ffd0e1ad3d
-
SHA1
81827e222c0115e054c74d0c7718a98cc554d849
-
SHA256
87de37590bb74823203e44a5dedd6038316c3aae1f7a8c02493c40a896382d5f
-
SHA512
785258115d8adc38e95aa4cf548d588281bfded3428bb15a34e910c6e85ab01fbb79172c12ee9f51246d1db2246a2ff027a75618a0b08f614f04749c3c0fc3ab
Score10/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1