General
-
Target
AnxelsMenu.exe
-
Size
107.3MB
-
Sample
241015-17xd7azeqb
-
MD5
247fee38f0880752865a537055a3df09
-
SHA1
4d034fefa0c18bd78513961acabc14921eca5503
-
SHA256
80c240a288fdbf9383bf06758c5eaa7f1a1eb3bb8ff06ad23c13e68d87bdb0c9
-
SHA512
7316315f040a4d702cc5b0846c86acdcfa5364972d61fbc32c3cf3a1bd2abc406d4b66f438bbc07e8da52487fabfe10859a372fa0144050f9ca1671f4780d33d
-
SSDEEP
3145728:eN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2Ox7RE:etJSWNa6NHCixiieB
Behavioral task
behavioral1
Sample
AnxelsMenu.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
AnxelsMenu.exe
-
Size
107.3MB
-
MD5
247fee38f0880752865a537055a3df09
-
SHA1
4d034fefa0c18bd78513961acabc14921eca5503
-
SHA256
80c240a288fdbf9383bf06758c5eaa7f1a1eb3bb8ff06ad23c13e68d87bdb0c9
-
SHA512
7316315f040a4d702cc5b0846c86acdcfa5364972d61fbc32c3cf3a1bd2abc406d4b66f438bbc07e8da52487fabfe10859a372fa0144050f9ca1671f4780d33d
-
SSDEEP
3145728:eN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2Ox7RE:etJSWNa6NHCixiieB
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1