General
-
Target
Extreme_V4.2.exe
-
Size
44KB
-
Sample
241206-3hgcsatmfz
-
MD5
42543291c63df7ea7c65ecb6577f915a
-
SHA1
8ea6dac698bd1f222406247267d251bc752b0ec2
-
SHA256
49aa63c8ffb77bae81987916b809f168442807c87de01f7baa01b430a28a669f
-
SHA512
c98514fcf6e8b8f8b53793ce9ed773d78ba3aee7411c7a35fd8c047dda6def5556d36582138159f418744410242f10f3a6cdc91723e572b664478e61ef643523
-
SSDEEP
768:GoVzlbz8pRftp9hNsOjz4td8n07CO0f8cbFX36F8nbcuyD7U:FNlbuRfbF/jzeq0eO00oaCnouy8
Behavioral task
behavioral1
Sample
Extreme_V4.2.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Extreme_V4.2.exe
-
Size
44KB
-
MD5
42543291c63df7ea7c65ecb6577f915a
-
SHA1
8ea6dac698bd1f222406247267d251bc752b0ec2
-
SHA256
49aa63c8ffb77bae81987916b809f168442807c87de01f7baa01b430a28a669f
-
SHA512
c98514fcf6e8b8f8b53793ce9ed773d78ba3aee7411c7a35fd8c047dda6def5556d36582138159f418744410242f10f3a6cdc91723e572b664478e61ef643523
-
SSDEEP
768:GoVzlbz8pRftp9hNsOjz4td8n07CO0f8cbFX36F8nbcuyD7U:FNlbuRfbF/jzeq0eO00oaCnouy8
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1