General
-
Target
Insta乗っ取り.exe
-
Size
12.8MB
-
Sample
241126-p9b1gsslat
-
MD5
de7860d4d6be9c13acee02489caa19a5
-
SHA1
4b561424d054f36c247f400e95ec0a4a226687d3
-
SHA256
bc6af9ff1b56c779aa75f349a07c4627905f01dff6a68565b4b4baa4ee9f5d70
-
SHA512
bbebb9d972d6653639b597527d70798626eacb93b89a3227da480a0091b8fae08988082633043bc76b741420eb18385b5025c115e451938bf9d83b05230fd74f
-
SSDEEP
393216:9892kr6LfOYD+hQdPC5OA3+76PHWaZOIEUespeZlMQJM9YH:CVmLGYD+haC5OA3+76PHq40MQO6
Static task
static1
Behavioral task
behavioral1
Sample
Insta乗っ取り.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Insta乗っ取り.exe
-
Size
12.8MB
-
MD5
de7860d4d6be9c13acee02489caa19a5
-
SHA1
4b561424d054f36c247f400e95ec0a4a226687d3
-
SHA256
bc6af9ff1b56c779aa75f349a07c4627905f01dff6a68565b4b4baa4ee9f5d70
-
SHA512
bbebb9d972d6653639b597527d70798626eacb93b89a3227da480a0091b8fae08988082633043bc76b741420eb18385b5025c115e451938bf9d83b05230fd74f
-
SSDEEP
393216:9892kr6LfOYD+hQdPC5OA3+76PHWaZOIEUespeZlMQJM9YH:CVmLGYD+haC5OA3+76PHq40MQO6
-
Modifies WinLogon for persistence
-
Disables Task Manager via registry modification
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
3