General
-
Target
app.exe
-
Size
1.2MB
-
Sample
241009-j51kdssakb
-
MD5
58ba20a38c3042d6a13dfec3c561cfbd
-
SHA1
ea3a47e6a46b990f6046bd77b96e9d42bdd3a55f
-
SHA256
ae1ff3a27a9e826de5b69d0a8c54bb8751daed10bdd8ac4dd04f2539877b0db1
-
SHA512
833315c7ad0159193f49d46a7b490458725bb230d4b048ea24cc60562f1cfa26f6262c42882d0970dc0c4bd3eec8198730fc7541b6dd48dbb4132341259328ed
-
SSDEEP
24576:Lrr/9x2rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmzpIT1:LH+zxbUJndWeMln8FrmXmSmaIT1
Behavioral task
behavioral1
Sample
app.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
app.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
app.exe
-
Size
1.2MB
-
MD5
58ba20a38c3042d6a13dfec3c561cfbd
-
SHA1
ea3a47e6a46b990f6046bd77b96e9d42bdd3a55f
-
SHA256
ae1ff3a27a9e826de5b69d0a8c54bb8751daed10bdd8ac4dd04f2539877b0db1
-
SHA512
833315c7ad0159193f49d46a7b490458725bb230d4b048ea24cc60562f1cfa26f6262c42882d0970dc0c4bd3eec8198730fc7541b6dd48dbb4132341259328ed
-
SSDEEP
24576:Lrr/9x2rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmzpIT1:LH+zxbUJndWeMln8FrmXmSmaIT1
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1