General
-
Target
Virus.exe
-
Size
6.7MB
-
Sample
241209-szmk1sxldj
-
MD5
7934cac1097c699a3d4b2e683eb53014
-
SHA1
8f0709fd999200f1bfdd3d35f4a7adab3911e1e1
-
SHA256
3690bc42c1c05331b2ea1374f99230cfe82d71bb72098d679575df6cdf6ad308
-
SHA512
41dfd120ddc50b95daaea7b663b6dc088083916f158f438807681e991e170399da47591e43a4b5c5d76c5238a605ac3244e36a0d064582fc0b8eca8a73638d55
-
SSDEEP
196608:FCXlY8XMCHGLLc54i1wN+lPIcu9KYK39sI3PPJNMRRccx:kXdXMCHWUjqcuI3/PJNe
Behavioral task
behavioral1
Sample
Virus.exe
Resource
win11-20241007-es
Malware Config
Targets
-
-
Target
Virus.exe
-
Size
6.7MB
-
MD5
7934cac1097c699a3d4b2e683eb53014
-
SHA1
8f0709fd999200f1bfdd3d35f4a7adab3911e1e1
-
SHA256
3690bc42c1c05331b2ea1374f99230cfe82d71bb72098d679575df6cdf6ad308
-
SHA512
41dfd120ddc50b95daaea7b663b6dc088083916f158f438807681e991e170399da47591e43a4b5c5d76c5238a605ac3244e36a0d064582fc0b8eca8a73638d55
-
SSDEEP
196608:FCXlY8XMCHGLLc54i1wN+lPIcu9KYK39sI3PPJNMRRccx:kXdXMCHWUjqcuI3/PJNe
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1