General
-
Target
EliteOptimizer.rar
-
Size
189.5MB
-
Sample
241119-c2lhqsyph1
-
MD5
8928d75e505886726469f77f4782ae94
-
SHA1
060d0cb98950dda87b5b0f64bb4160ba3ad24f07
-
SHA256
376c01cb99de2b3a737c091b33ccebb569c54d43f85f4b3aa4f855776e1cf72b
-
SHA512
2af4303b43bca06f540845d1e34e085553b8a9eb84e45801a665ced7cde07e2be94822c8b6eba59b93122197dd272fb5155799e6625f2a96190d76d23f30824e
-
SSDEEP
3145728:OVjnONrbwYmUznd70jRIeXpbHRxSBye9fNykKmk6dzNUqDEpsxjDoVH/decKw10S:UzZ/UqpbHRx6ye9g0dzzD598VTCKgYDl
Behavioral task
behavioral1
Sample
EliteOptimizer.rar
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
EliteOptimizer.rar
-
Size
189.5MB
-
MD5
8928d75e505886726469f77f4782ae94
-
SHA1
060d0cb98950dda87b5b0f64bb4160ba3ad24f07
-
SHA256
376c01cb99de2b3a737c091b33ccebb569c54d43f85f4b3aa4f855776e1cf72b
-
SHA512
2af4303b43bca06f540845d1e34e085553b8a9eb84e45801a665ced7cde07e2be94822c8b6eba59b93122197dd272fb5155799e6625f2a96190d76d23f30824e
-
SSDEEP
3145728:OVjnONrbwYmUznd70jRIeXpbHRxSBye9fNykKmk6dzNUqDEpsxjDoVH/decKw10S:UzZ/UqpbHRx6ye9g0dzzD598VTCKgYDl
-
Modifies boot configuration data using bcdedit
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Possible privilege escalation attempt
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
2