Resubmissions
24-12-2024 20:26
241224-y7zs7swpbz 724-12-2024 20:24
241224-y6plvawng1 724-12-2024 20:11
241224-yyndtawma1 324-12-2024 03:17
241224-dtfsyszrfy 719-12-2024 22:19
241219-18ntfasjer 319-12-2024 22:15
241219-16jfya1nft 419-12-2024 22:14
241219-15qtmasjaj 316-12-2024 01:31
241216-bxgtbaynbj 1015-12-2024 19:21
241215-x219eawjbk 815-12-2024 04:23
241215-ezyfmawkbq 3General
-
Target
http://noescape.exe
-
Sample
241215-x219eawjbk
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
http://noescape.exe
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
6System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1