General
-
Target
idman642build23.exe
-
Size
11.7MB
-
Sample
241113-v5t86awgkj
-
MD5
1d4170878199111b6398a5a1d476e272
-
SHA1
bc7dcf056b6be9aa7f3ee9922d08ad3ccf9b39ad
-
SHA256
dd0d8aa84d52d176ed315c24ef0ca96134367da12488eff4abd85f098521b9f0
-
SHA512
42353a26afd051cc9865e90e532f1c217f520f6a90ce74ef1e428c619d42559265a91cfa61aa7a9f32209cf47a7e0fefdc227a217dd3160d58cb8b745019d6b8
-
SSDEEP
196608:CP5p3d3Z+7sqy0MEYOI18oNWeNTn9zU2HNZ4d+rOFfVDbZjh4SnzD2pe85DCkpjZ:Ufp+7zMJO+Z/ZNtZKkOLnZ1zKpj9CkVZ
Static task
static1
Behavioral task
behavioral1
Sample
idman642build23.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
idman642build23.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
idman642build23.exe
-
Size
11.7MB
-
MD5
1d4170878199111b6398a5a1d476e272
-
SHA1
bc7dcf056b6be9aa7f3ee9922d08ad3ccf9b39ad
-
SHA256
dd0d8aa84d52d176ed315c24ef0ca96134367da12488eff4abd85f098521b9f0
-
SHA512
42353a26afd051cc9865e90e532f1c217f520f6a90ce74ef1e428c619d42559265a91cfa61aa7a9f32209cf47a7e0fefdc227a217dd3160d58cb8b745019d6b8
-
SSDEEP
196608:CP5p3d3Z+7sqy0MEYOI18oNWeNTn9zU2HNZ4d+rOFfVDbZjh4SnzD2pe85DCkpjZ:Ufp+7zMJO+Z/ZNtZKkOLnZ1zKpj9CkVZ
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: [email protected]
-
Adds Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1