General
-
Target
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
-
Size
64KB
-
Sample
241120-datkpsyema
-
MD5
da7e3e0ba0416e585ed5b193b192755c
-
SHA1
311f0069519d5993d8fb6eca6e527404d8a10883
-
SHA256
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b
-
SHA512
0eb5d3425dd7f1cd4da84aae38ec8a26e0e1cf142e3595e87bbd22d250a902f6877d2cadc864164887b730b493c99b967c2553c15892fd47d6d2da60424a23fb
-
SSDEEP
768:rAUJmQCcmLCXQq6fsKiJYsIkjJVzqsVG5kuGKQLddOW/34WvLTkXWXzL:sUNHFKQbIkHvGMdOo40T7L
Behavioral task
behavioral1
Sample
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
-
Size
64KB
-
MD5
da7e3e0ba0416e585ed5b193b192755c
-
SHA1
311f0069519d5993d8fb6eca6e527404d8a10883
-
SHA256
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b
-
SHA512
0eb5d3425dd7f1cd4da84aae38ec8a26e0e1cf142e3595e87bbd22d250a902f6877d2cadc864164887b730b493c99b967c2553c15892fd47d6d2da60424a23fb
-
SSDEEP
768:rAUJmQCcmLCXQq6fsKiJYsIkjJVzqsVG5kuGKQLddOW/34WvLTkXWXzL:sUNHFKQbIkHvGMdOo40T7L
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1