General
-
Target
nwindowsdll.msi
-
Size
2.9MB
-
Sample
241207-sdvz9s1ldk
-
MD5
de06a5a4a5bb3ffc9d4bc0d7026bd406
-
SHA1
e876dc6f3d25085f8b6d1ec0d4d9d728689f9ab3
-
SHA256
20c6058c764f6333f601cb4b8810be8b6ea9d850f885d688621191791a3c3a88
-
SHA512
d2ce911a002ea132073bcacfe3a2aadf1e8a35ac71344449d9f332904b76a752cdf085a8176cdf98df73c9e140bc1023f273351869b27a9fc8907914c47e43f0
-
SSDEEP
49152:q+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:q+lUlz9FKbsodq0YaH7ZPxMb8tT
Behavioral task
behavioral1
Sample
nwindowsdll.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nwindowsdll.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
nwindowsdll.msi
-
Size
2.9MB
-
MD5
de06a5a4a5bb3ffc9d4bc0d7026bd406
-
SHA1
e876dc6f3d25085f8b6d1ec0d4d9d728689f9ab3
-
SHA256
20c6058c764f6333f601cb4b8810be8b6ea9d850f885d688621191791a3c3a88
-
SHA512
d2ce911a002ea132073bcacfe3a2aadf1e8a35ac71344449d9f332904b76a752cdf085a8176cdf98df73c9e140bc1023f273351869b27a9fc8907914c47e43f0
-
SSDEEP
49152:q+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:q+lUlz9FKbsodq0YaH7ZPxMb8tT
-
Ateraagent family
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1