General
-
Target
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
-
Size
2KB
-
Sample
241127-dhhheazqer
-
MD5
4a658619a07a5237c0e85b75bf14e644
-
SHA1
089a04cc3a66c5b86ddbb6a481c5ab8702c1e621
-
SHA256
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177
-
SHA512
88e0b970b2da52b263ecd6008a58df1094ce1acac03bd1358afad0d99daa6c3f89c32122451a3f6632f42db70541b3982ecaff046eda569968ed6ffd2879a394
Static task
static1
Behavioral task
behavioral1
Sample
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
-
Size
2KB
-
MD5
4a658619a07a5237c0e85b75bf14e644
-
SHA1
089a04cc3a66c5b86ddbb6a481c5ab8702c1e621
-
SHA256
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177
-
SHA512
88e0b970b2da52b263ecd6008a58df1094ce1acac03bd1358afad0d99daa6c3f89c32122451a3f6632f42db70541b3982ecaff046eda569968ed6ffd2879a394
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Blocklisted process makes network request
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Users
1Indicator Removal
1Network Share Connection Removal
1Modify Registry
1