General
-
Target
mainscript.exe
-
Size
30.5MB
-
Sample
241120-gbkwqs1hpc
-
MD5
fe938dddcdde5dead88664b162203f13
-
SHA1
26a09a6863e3c37eae88238a7af01f52885dc075
-
SHA256
5a8a920e53d94da984ebcd9ff188c91feb71843442ca64a6af53252f49fbf699
-
SHA512
d7334b5c787fc0adc497974bfeb23488a64a586fe5bbaae3b68d47398cca5845796cf4eafc3ee1afe7d15095793776c1537f2872565b3385a006097267bced88
-
SSDEEP
786432:su9Yi8MkQ1JnW828P51QtIbSw1JIxHEha8DZcQl8uBDHDIlDP:B9SA1Wr8PXiI2gNs6OupM
Behavioral task
behavioral1
Sample
mainscript.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
mainscript.exe
-
Size
30.5MB
-
MD5
fe938dddcdde5dead88664b162203f13
-
SHA1
26a09a6863e3c37eae88238a7af01f52885dc075
-
SHA256
5a8a920e53d94da984ebcd9ff188c91feb71843442ca64a6af53252f49fbf699
-
SHA512
d7334b5c787fc0adc497974bfeb23488a64a586fe5bbaae3b68d47398cca5845796cf4eafc3ee1afe7d15095793776c1537f2872565b3385a006097267bced88
-
SSDEEP
786432:su9Yi8MkQ1JnW828P51QtIbSw1JIxHEha8DZcQl8uBDHDIlDP:B9SA1Wr8PXiI2gNs6OupM
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1