General
-
Target
source_prepared.exe
-
Size
77.8MB
-
Sample
240929-t7x76avgmd
-
MD5
60ff27fb8cd08e937ba9b6d1b18840b4
-
SHA1
1da9a0075d366b81446265f63e27bc85553db2a3
-
SHA256
fd8a52dd8dee2d367e831a1ff474baaacd13b2296580b882d14b86162406416a
-
SHA512
62f14b688df29729f76a3f34b89e3c1d383ea9f045886791ea8354123448504cb65cb023ebb9f45cf20b806f5848bdcc2c8d2a7661388aa8de1ec2130022c622
-
SSDEEP
1572864:pvHcRl3WQKmSk8IpG7V+VPhqYdfzE7tlHegiYweyJulZUdg1hjrrRdECV37U:pvHcR5YmSkB05awcf2dMpuxh/rDNo
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
77.8MB
-
MD5
60ff27fb8cd08e937ba9b6d1b18840b4
-
SHA1
1da9a0075d366b81446265f63e27bc85553db2a3
-
SHA256
fd8a52dd8dee2d367e831a1ff474baaacd13b2296580b882d14b86162406416a
-
SHA512
62f14b688df29729f76a3f34b89e3c1d383ea9f045886791ea8354123448504cb65cb023ebb9f45cf20b806f5848bdcc2c8d2a7661388aa8de1ec2130022c622
-
SSDEEP
1572864:pvHcRl3WQKmSk8IpG7V+VPhqYdfzE7tlHegiYweyJulZUdg1hjrrRdECV37U:pvHcR5YmSkB05awcf2dMpuxh/rDNo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1