General
-
Target
google_64.exe.v
-
Size
21.9MB
-
Sample
241003-g8wphasgrg
-
MD5
7f0d1df1b223a4fc990a4700ece2cc4e
-
SHA1
db3ad54de7a0aee48aa253a2a3aa1953b3717886
-
SHA256
a99617fe1fcbdad576a2fc91a990b99d0b4c48bbe2b2ccf7965293b7c96091e3
-
SHA512
fa50696c4aaba304724252c021e409dddc989045a96cc726a94281321c955f78b152789ae3045efaa07f2b1f7c9255d1332f69d7bcada752ad62964aa27e1bc7
-
SSDEEP
393216:nEzKufCTmBlwejWc9AVftZwwUUu/eWNyT55ybi5o2TXnH/SE9f3Wt8797mmwAB26:afCKlwOW68pxWNK5H5okXnH/SMf3uqmo
Static task
static1
Behavioral task
behavioral1
Sample
google_64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
google_64.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
google_64.exe.v
-
Size
21.9MB
-
MD5
7f0d1df1b223a4fc990a4700ece2cc4e
-
SHA1
db3ad54de7a0aee48aa253a2a3aa1953b3717886
-
SHA256
a99617fe1fcbdad576a2fc91a990b99d0b4c48bbe2b2ccf7965293b7c96091e3
-
SHA512
fa50696c4aaba304724252c021e409dddc989045a96cc726a94281321c955f78b152789ae3045efaa07f2b1f7c9255d1332f69d7bcada752ad62964aa27e1bc7
-
SSDEEP
393216:nEzKufCTmBlwejWc9AVftZwwUUu/eWNyT55ybi5o2TXnH/SE9f3Wt8797mmwAB26:afCKlwOW68pxWNK5H5okXnH/SMf3uqmo
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1