General
-
Target
jk.txt
-
Size
4.8MB
-
Sample
241001-s2qepaxaqj
-
MD5
7740e3d8ec8596c000c8aa454b189f70
-
SHA1
226341f5cc2fdd1d3c9077df74b3b75b578e14b2
-
SHA256
df069d61a48578ec720196c7d17f60872aa8988430c13965b9b95c4b8ea748be
-
SHA512
7000e1640907f38339ec54401f3435e6647df57deea7795664df8121e8212451713c3ac7b20bfc3ef3ac10606c376e56355d93e313ea2a5f104a2b37bc737627
-
SSDEEP
98304:pl2OfyzLdIvT/magEjgw9GE4tS1Duq/P5ksl+KuNFdo0LY8:MOvdgqjGVS1CqXJl+rtD
Static task
static1
Behavioral task
behavioral1
Sample
jk.txt
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
jk.txt
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
jk.txt
-
Size
4.8MB
-
MD5
7740e3d8ec8596c000c8aa454b189f70
-
SHA1
226341f5cc2fdd1d3c9077df74b3b75b578e14b2
-
SHA256
df069d61a48578ec720196c7d17f60872aa8988430c13965b9b95c4b8ea748be
-
SHA512
7000e1640907f38339ec54401f3435e6647df57deea7795664df8121e8212451713c3ac7b20bfc3ef3ac10606c376e56355d93e313ea2a5f104a2b37bc737627
-
SSDEEP
98304:pl2OfyzLdIvT/magEjgw9GE4tS1Duq/P5ksl+KuNFdo0LY8:MOvdgqjGVS1CqXJl+rtD
-
Possible privilege escalation attempt
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Accessibility Features
1Power Settings
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Event Triggered Execution
1Accessibility Features
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1