General
-
Target
Anmerkung 2024-01-18 231511.png
-
Size
321KB
-
Sample
241130-3zr6lstqdl
-
MD5
921e48fd77add10603c4b4fa4833b3b1
-
SHA1
702e4a5887419373aeee0db9e41887d52d796bb3
-
SHA256
faf6dd2652f889431407df47b973dcdfa1d4c790bead60e75b123ea8964cb36e
-
SHA512
116bb75bde4c692e98cc0735694edb2e0f90b7ed397753b8481a2747fce8bcf43b221d8e955a95941df588091d853214a10c4a347aa798ac60f046cc11ec6a7d
-
SSDEEP
6144:3iAw0Kz4kgawmXR7RYTwX7DprHlk5+kF1+4TXTYPyNmUZyzeCzGYGfKJrTpWqaJw:XSprXR9Y0FHlk4krFTXMyNmUgiCzGYGw
Static task
static1
Behavioral task
behavioral1
Sample
Anmerkung 2024-01-18 231511.png
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Anmerkung 2024-01-18 231511.png
-
Size
321KB
-
MD5
921e48fd77add10603c4b4fa4833b3b1
-
SHA1
702e4a5887419373aeee0db9e41887d52d796bb3
-
SHA256
faf6dd2652f889431407df47b973dcdfa1d4c790bead60e75b123ea8964cb36e
-
SHA512
116bb75bde4c692e98cc0735694edb2e0f90b7ed397753b8481a2747fce8bcf43b221d8e955a95941df588091d853214a10c4a347aa798ac60f046cc11ec6a7d
-
SSDEEP
6144:3iAw0Kz4kgawmXR7RYTwX7DprHlk5+kF1+4TXTYPyNmUZyzeCzGYGfKJrTpWqaJw:XSprXR9Y0FHlk4krFTXMyNmUgiCzGYGw
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Power Settings
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1