General
-
Target
SpywareTerminatorSetup.exe
-
Size
8.8MB
-
Sample
241108-2l67ya1glj
-
MD5
c3a9452f054664daf4de1e246c485c20
-
SHA1
e0185db4a5c5b7379a0eff099e39f0f56a18ba89
-
SHA256
9f95bbe3fb28e4c290e869b40ae20dcd9db64071cda11a77a9313c0e13b55518
-
SHA512
6438fb21aa223d354864b6ca14f42668007a17db718727266e54cd2b7f44e9924e51187b604cb7913dc550354114efc0b55834832f891ac6796a53abc928fca9
-
SSDEEP
196608:59Xf8Of5m6QpeBh4BE8h1RipvU0SQ7pZ+nU8TjLkYJC:TXfvflGeX4BXr6vtH1AUI/7J
Static task
static1
Behavioral task
behavioral1
Sample
SpywareTerminatorSetup.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
SpywareTerminatorSetup.exe
-
Size
8.8MB
-
MD5
c3a9452f054664daf4de1e246c485c20
-
SHA1
e0185db4a5c5b7379a0eff099e39f0f56a18ba89
-
SHA256
9f95bbe3fb28e4c290e869b40ae20dcd9db64071cda11a77a9313c0e13b55518
-
SHA512
6438fb21aa223d354864b6ca14f42668007a17db718727266e54cd2b7f44e9924e51187b604cb7913dc550354114efc0b55834832f891ac6796a53abc928fca9
-
SSDEEP
196608:59Xf8Of5m6QpeBh4BE8h1RipvU0SQ7pZ+nU8TjLkYJC:TXfvflGeX4BXr6vtH1AUI/7J
-
Hawkeye family
-
Xmrig family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
XMRig Miner payload
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Contacts a large (1448) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: [email protected]
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Adds Run key to start application
-
Downloads MZ/PE file
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Program crash
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
8Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1