General
-
Target
setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe.v
-
Size
116.4MB
-
Sample
241015-e9nzyazakq
-
MD5
d164724461b25eb363a1a31d3333cc65
-
SHA1
6c1192a6e79fbc1b9c5d415fa98567d87be0b2c9
-
SHA256
1bed372c2eac53075a040d6f2aae22659e0e0fee2ce21835dd95e3c580cc1e05
-
SHA512
bdb591a44e49cddb56e130b67d4c1f202b362cb64e53ba0608a1408863147f9953d57f17cdafdd5946061318f0825e950dd690f92ace8b88d582a94ad8452548
-
SSDEEP
3145728:jLH+5LLf4eHgCo6iYPR0vGQNb5ZdqIUhEb0TsT8SO5i:fe5XHggiYPGvDh7dqx2b0T1SO5i
Static task
static1
Behavioral task
behavioral1
Sample
setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe.v
-
Size
116.4MB
-
MD5
d164724461b25eb363a1a31d3333cc65
-
SHA1
6c1192a6e79fbc1b9c5d415fa98567d87be0b2c9
-
SHA256
1bed372c2eac53075a040d6f2aae22659e0e0fee2ce21835dd95e3c580cc1e05
-
SHA512
bdb591a44e49cddb56e130b67d4c1f202b362cb64e53ba0608a1408863147f9953d57f17cdafdd5946061318f0825e950dd690f92ace8b88d582a94ad8452548
-
SSDEEP
3145728:jLH+5LLf4eHgCo6iYPR0vGQNb5ZdqIUhEb0TsT8SO5i:fe5XHggiYPGvDh7dqx2b0T1SO5i
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1