General
-
Target
banner.PNG
-
Size
544KB
-
Sample
241017-xpr5zazhkb
-
MD5
3a531656b6bdf14476d14fc6d643dd75
-
SHA1
7cc8633d35e1e7bfa0357cc3f47c3c025bf56a0c
-
SHA256
4794bed7e8edba30084dab52f27b1fdfe69d5a31d6bf8cdec48214760acde066
-
SHA512
f120643e9afa1cf1d3e5eccc39444452a0197898e5a9c627a11291a7854150497b8d5e566f4c373ae7c97f6536f82417afa49f5fd46839d6e83384c89eb896cf
-
SSDEEP
12288:gcqOZRLk6vUTJU12bie1m+hQlnYIejdBuAbJ4qxMQKrfFYH5h5:bDZV3UTe82Em+hQlnYIMTt4quNSH5j
Static task
static1
Behavioral task
behavioral1
Sample
banner.png
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
banner.PNG
-
Size
544KB
-
MD5
3a531656b6bdf14476d14fc6d643dd75
-
SHA1
7cc8633d35e1e7bfa0357cc3f47c3c025bf56a0c
-
SHA256
4794bed7e8edba30084dab52f27b1fdfe69d5a31d6bf8cdec48214760acde066
-
SHA512
f120643e9afa1cf1d3e5eccc39444452a0197898e5a9c627a11291a7854150497b8d5e566f4c373ae7c97f6536f82417afa49f5fd46839d6e83384c89eb896cf
-
SSDEEP
12288:gcqOZRLk6vUTJU12bie1m+hQlnYIejdBuAbJ4qxMQKrfFYH5h5:bDZV3UTe82Em+hQlnYIMTt4quNSH5j
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
5System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1