General
-
Target
spf.exe
-
Size
92.8MB
-
Sample
241112-hl4x2azpep
-
MD5
90b6f7548041c7bc7544cb8639beecb5
-
SHA1
a31fff67409ee1babe4876f77a17c866762a7fbc
-
SHA256
ed9a7ff6e6bc2cc42bd856a288c04b2e353e5f0542f6d6389097afb4fcaca9e6
-
SHA512
56e8d9ad782733277a0c2564cab40f830245cce69dc751e8f53399fc41ecfe5423a1f054aef223758da967b126241e634ea8af6fbe2cb160ca27c51d6a924f47
-
SSDEEP
1572864:n5fI9tOXCWdgpb17D+SUCnpZIRxupEfi/+AbjCrzvJwQipn4avCiXk:5fIDCq7SSUCnpZISplvbjUipXk
Static task
static1
Behavioral task
behavioral1
Sample
spf.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
spf.exe
-
Size
92.8MB
-
MD5
90b6f7548041c7bc7544cb8639beecb5
-
SHA1
a31fff67409ee1babe4876f77a17c866762a7fbc
-
SHA256
ed9a7ff6e6bc2cc42bd856a288c04b2e353e5f0542f6d6389097afb4fcaca9e6
-
SHA512
56e8d9ad782733277a0c2564cab40f830245cce69dc751e8f53399fc41ecfe5423a1f054aef223758da967b126241e634ea8af6fbe2cb160ca27c51d6a924f47
-
SSDEEP
1572864:n5fI9tOXCWdgpb17D+SUCnpZIRxupEfi/+AbjCrzvJwQipn4avCiXk:5fIDCq7SSUCnpZISplvbjUipXk
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops desktop.ini file(s)
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1