General
-
Target
rename (2).exe
-
Size
1.6MB
-
Sample
241002-m39l3asdpp
-
MD5
2192b5059195d40c7a737bcfcc04abb2
-
SHA1
1d103964af1ab922252ce1091e906abdebb024b7
-
SHA256
7cb991b1ecf41a669ad9cf31bf882f9eb3e31381b757c073fccc4e57a224caba
-
SHA512
628d6eb048ad3b9fd4c0c1a31415b7b9e6edb6f1b560e02894ab3de397193d895e1d9c7dd735dd54fab101d4d5b97b96000369328df3f926877502a4e41187e2
-
SSDEEP
12288:wp7vRsqy57qrWFsmQ3HUdUyxWKZPKv8y0yx2sYfFNbuyG:U7v4UN3HUWpQSvQPdZu3
Static task
static1
Behavioral task
behavioral1
Sample
rename (2).exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
rename (2).exe
-
Size
1.6MB
-
MD5
2192b5059195d40c7a737bcfcc04abb2
-
SHA1
1d103964af1ab922252ce1091e906abdebb024b7
-
SHA256
7cb991b1ecf41a669ad9cf31bf882f9eb3e31381b757c073fccc4e57a224caba
-
SHA512
628d6eb048ad3b9fd4c0c1a31415b7b9e6edb6f1b560e02894ab3de397193d895e1d9c7dd735dd54fab101d4d5b97b96000369328df3f926877502a4e41187e2
-
SSDEEP
12288:wp7vRsqy57qrWFsmQ3HUdUyxWKZPKv8y0yx2sYfFNbuyG:U7v4UN3HUWpQSvQPdZu3
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
5System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1