General
-
Target
fbbe7479389b0145d4c06e514176513a627cc16fb762972d5b2c9b0becc61ff6
-
Size
1.4MB
-
Sample
241104-j4njfaxhqk
-
MD5
76d5e5e36e3dd07c9394fecace26bffc
-
SHA1
69004dead686db275d3921a106773e9d17fbf93d
-
SHA256
fbbe7479389b0145d4c06e514176513a627cc16fb762972d5b2c9b0becc61ff6
-
SHA512
b435579e53e31bf3f32ab812a8d1e1da989ba179eec007fd19f86b18054d2f6811023dc6d8c9557ed5d0e4f37d8ae3d1fd8c93db82b256c06d0f825e169631dc
-
SSDEEP
24576:9M/OP0Z/V6izJr5XcJfRi4PxiEw/+Pqwr6GBm0e9UyiL100RZBFP:sOPW/Mi95XcJfgixrw/yqs6GS9HiCMZ/
Static task
static1
Behavioral task
behavioral1
Sample
fbbe7479389b0145d4c06e514176513a627cc16fb762972d5b2c9b0becc61ff6.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
fbbe7479389b0145d4c06e514176513a627cc16fb762972d5b2c9b0becc61ff6
-
Size
1.4MB
-
MD5
76d5e5e36e3dd07c9394fecace26bffc
-
SHA1
69004dead686db275d3921a106773e9d17fbf93d
-
SHA256
fbbe7479389b0145d4c06e514176513a627cc16fb762972d5b2c9b0becc61ff6
-
SHA512
b435579e53e31bf3f32ab812a8d1e1da989ba179eec007fd19f86b18054d2f6811023dc6d8c9557ed5d0e4f37d8ae3d1fd8c93db82b256c06d0f825e169631dc
-
SSDEEP
24576:9M/OP0Z/V6izJr5XcJfRi4PxiEw/+Pqwr6GBm0e9UyiL100RZBFP:sOPW/Mi95XcJfgixrw/yqs6GS9HiCMZ/
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1