General
-
Target
581156
-
Size
2KB
-
Sample
241002-s8wkaaxhqd
-
MD5
b90990ae998113e6be778456c371ddd6
-
SHA1
5b461067c036278c1d188747bfb9013b0a24a5ca
-
SHA256
b02e7288879dafd70e5061b46c0536b7e170397290db3fab34ac7a3fd28d79ff
-
SHA512
296bc63a4fb24c677af5a736806e5466bcb71749293f233389228690566c973107f96a64069e51b5bdc06b0455bf1ef18b9796a8deacaf85643a3deb1434008b
Static task
static1
Behavioral task
behavioral1
Sample
581156.html
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
581156
-
Size
2KB
-
MD5
b90990ae998113e6be778456c371ddd6
-
SHA1
5b461067c036278c1d188747bfb9013b0a24a5ca
-
SHA256
b02e7288879dafd70e5061b46c0536b7e170397290db3fab34ac7a3fd28d79ff
-
SHA512
296bc63a4fb24c677af5a736806e5466bcb71749293f233389228690566c973107f96a64069e51b5bdc06b0455bf1ef18b9796a8deacaf85643a3deb1434008b
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Browser Extensions
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1