General
-
Target
1101.mp4
-
Size
94.1MB
-
Sample
241109-vc24as1lgj
-
MD5
85d336d15357f8959cd9ae5625d2bede
-
SHA1
6fbb5b9c69dceacd9bb14b88c446d7582b89da25
-
SHA256
7b74a2825e4352648153af617a569148e5f1622b545ca0687294cc495e4e608d
-
SHA512
93d635eded48c0687ef6e599d3aa6c47ad534b272fcf3f8b5bd3a9e77895a351b170ecc73501b2efd100002c881b050d45aa239a22ad6294c6f34d01a4536e5d
-
SSDEEP
1572864:jUmwT45vSpJqY9FWAwK/Wf28BxV496iaFNCSXHgTVl9iweVkh7J+je0DfIspWkuL:9wT9/9nrKy6iaqIA5izDwspWks
Static task
static1
Behavioral task
behavioral1
Sample
1101.mp4
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
1101.mp4
-
Size
94.1MB
-
MD5
85d336d15357f8959cd9ae5625d2bede
-
SHA1
6fbb5b9c69dceacd9bb14b88c446d7582b89da25
-
SHA256
7b74a2825e4352648153af617a569148e5f1622b545ca0687294cc495e4e608d
-
SHA512
93d635eded48c0687ef6e599d3aa6c47ad534b272fcf3f8b5bd3a9e77895a351b170ecc73501b2efd100002c881b050d45aa239a22ad6294c6f34d01a4536e5d
-
SSDEEP
1572864:jUmwT45vSpJqY9FWAwK/Wf28BxV496iaFNCSXHgTVl9iweVkh7J+je0DfIspWkuL:9wT9/9nrKy6iaqIA5izDwspWks
-
Modifies WinLogon for persistence
-
Zloader family
-
Contacts a large (879) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
A potential corporate email address has been identified in the URL: 0E920C0F53DA9E9B0A490D45@AdobeOrg
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
4Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
4Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
8Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Peripheral Device Discovery
2Query Registry
7System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1