General
-
Target
4c17b9cbf015185ea8c1dd1c85578cd1d8844a9e8f70ca63fd4e2b38bd1162adN.exe
-
Size
88KB
-
Sample
240925-t3fgjsyelb
-
MD5
d21d4bc7b374e50825ec19b75bf28fd0
-
SHA1
dacaf4ab1a393999319852aee376a639d772f990
-
SHA256
4c17b9cbf015185ea8c1dd1c85578cd1d8844a9e8f70ca63fd4e2b38bd1162ad
-
SHA512
f2308e9e48f18904d83e14a811c05104e45e7a227f8c4984ff6a747046a044f0dc6b6cda982984f3513cdc7b4ac0d00e668848cc6a156322f34aa6a77b9426b0
-
SSDEEP
768:aQNIscPXcOAKrm//4SE6rdcIz0M6mc39vAqBbXml/X4B0blMTIWo90UvIC2TVGpC:aCILvs9NctvAqlWpoBjpUv72TDFP
Static task
static1
Behavioral task
behavioral1
Sample
4c17b9cbf015185ea8c1dd1c85578cd1d8844a9e8f70ca63fd4e2b38bd1162adN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c17b9cbf015185ea8c1dd1c85578cd1d8844a9e8f70ca63fd4e2b38bd1162adN.exe
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
4c17b9cbf015185ea8c1dd1c85578cd1d8844a9e8f70ca63fd4e2b38bd1162adN.exe
-
Size
88KB
-
MD5
d21d4bc7b374e50825ec19b75bf28fd0
-
SHA1
dacaf4ab1a393999319852aee376a639d772f990
-
SHA256
4c17b9cbf015185ea8c1dd1c85578cd1d8844a9e8f70ca63fd4e2b38bd1162ad
-
SHA512
f2308e9e48f18904d83e14a811c05104e45e7a227f8c4984ff6a747046a044f0dc6b6cda982984f3513cdc7b4ac0d00e668848cc6a156322f34aa6a77b9426b0
-
SSDEEP
768:aQNIscPXcOAKrm//4SE6rdcIz0M6mc39vAqBbXml/X4B0blMTIWo90UvIC2TVGpC:aCILvs9NctvAqlWpoBjpUv72TDFP
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1