General
-
Target
img12.jpg
-
Size
121KB
-
Sample
241201-sr2d7syqgq
-
MD5
5d28177027ff3505cac5faf30f3fce1c
-
SHA1
f5344740e5814ad7b09c27723798a7b283597d98
-
SHA256
c7e0b5d2f1fc049601bab9697108bb03bf9b8643a7d741f4cd6332931cf0457c
-
SHA512
7143044d73e10281f1d3c0979c1daa0e6ae796edc3a56dd998a1d630c41d700d3d9af742c94d2b4b61a055d56a1203328819086c29c1038e58a495af1a4cc51d
-
SSDEEP
3072:zha4q4WMs9qabD0BWweOhHfgT3wdnjejF6I:da45W1qQD0BReOhYjyCjF5
Static task
static1
Behavioral task
behavioral1
Sample
img12.jpg
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
img12.jpg
-
Size
121KB
-
MD5
5d28177027ff3505cac5faf30f3fce1c
-
SHA1
f5344740e5814ad7b09c27723798a7b283597d98
-
SHA256
c7e0b5d2f1fc049601bab9697108bb03bf9b8643a7d741f4cd6332931cf0457c
-
SHA512
7143044d73e10281f1d3c0979c1daa0e6ae796edc3a56dd998a1d630c41d700d3d9af742c94d2b4b61a055d56a1203328819086c29c1038e58a495af1a4cc51d
-
SSDEEP
3072:zha4q4WMs9qabD0BWweOhHfgT3wdnjejF6I:da45W1qQD0BReOhYjyCjF5
-
Modifies visibility of file extensions in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
System Binary Proxy Execution: Rundll32
Abuse Rundll32 to proxy execution of malicious code.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
6System Binary Proxy Execution
1Rundll32
1