General
-
Target
Lagswitch_2.0.1_x86_en-US.msi
-
Size
3.6MB
-
Sample
241130-fsycqatpcz
-
MD5
88f53f1eef043e3f7b931e0461b52287
-
SHA1
fbebe0190b08236d2acea5a5b41058f0e301aa03
-
SHA256
d16a0ff410861d71b3be9b7f84200782f36ee7123c69294395f7d362fd1ae767
-
SHA512
299170a983d1025d7373dabeb6c2dc498a5db94543e5f38c04bb70cd67cc77bace5a84a7e0d7c5e886fe4b412cbe7000d2a1f287d071b935fa30ef4e40f34ccb
-
SSDEEP
98304:3vrEI3WzXhrWfAIaOm1xV04xPWl1zl0rY4T2VrP9Pv8m:3vQI3+hROmx04x+zI2VrF
Static task
static1
Behavioral task
behavioral1
Sample
Lagswitch_2.0.1_x86_en-US.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Lagswitch_2.0.1_x86_en-US.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Lagswitch_2.0.1_x86_en-US.msi
-
Size
3.6MB
-
MD5
88f53f1eef043e3f7b931e0461b52287
-
SHA1
fbebe0190b08236d2acea5a5b41058f0e301aa03
-
SHA256
d16a0ff410861d71b3be9b7f84200782f36ee7123c69294395f7d362fd1ae767
-
SHA512
299170a983d1025d7373dabeb6c2dc498a5db94543e5f38c04bb70cd67cc77bace5a84a7e0d7c5e886fe4b412cbe7000d2a1f287d071b935fa30ef4e40f34ccb
-
SSDEEP
98304:3vrEI3WzXhrWfAIaOm1xV04xPWl1zl0rY4T2VrP9Pv8m:3vQI3+hROmx04x+zI2VrF
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1