General
-
Target
6729D6CA-3CD2-42AC-8B23-B3E09EF19571.wav
-
Size
1.1MB
-
Sample
241206-y2ssps1pek
-
MD5
ce76b5989ddc2174d4d95eb731747df0
-
SHA1
0a51916f8079e2be76fa565d5a2d8725ff918776
-
SHA256
b3090b1eafac678a0f6348d6adb45301a85e66a1e4c5626558e8832c2814a6ea
-
SHA512
b20811407dc2f73c27b80cd44d6edeb5e19e55568fac7a397eec0e149cc4d4665d20ca194cadc834c6c66399aca63ec0de04110a05908187c0f3729668e25d5a
-
SSDEEP
24576:yE7QYhobchIDgO4KSITZu0aw96UvPlQRXY7WZb47XRx26K:yE8Yhooh0zlup5UvPlQRX2Kb47BER
Static task
static1
Behavioral task
behavioral1
Sample
6729D6CA-3CD2-42AC-8B23-B3E09EF19571.wav
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
6729D6CA-3CD2-42AC-8B23-B3E09EF19571.wav
-
Size
1.1MB
-
MD5
ce76b5989ddc2174d4d95eb731747df0
-
SHA1
0a51916f8079e2be76fa565d5a2d8725ff918776
-
SHA256
b3090b1eafac678a0f6348d6adb45301a85e66a1e4c5626558e8832c2814a6ea
-
SHA512
b20811407dc2f73c27b80cd44d6edeb5e19e55568fac7a397eec0e149cc4d4665d20ca194cadc834c6c66399aca63ec0de04110a05908187c0f3729668e25d5a
-
SSDEEP
24576:yE7QYhobchIDgO4KSITZu0aw96UvPlQRXY7WZb47XRx26K:yE8Yhooh0zlup5UvPlQRX2Kb47BER
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: 29E26A9C57069D117F000101@AdobeOrg
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1