General
-
Target
keyi1.zip
-
Size
93.6MB
-
Sample
241221-r1tkaa1nbv
-
MD5
6ae3059b73a1e222739683abd6715800
-
SHA1
86df186b69e5a9ce9cd194dbb430442148c78c2e
-
SHA256
b1cc45e42cbf1f530f02d3334beaa591dca557e4fa64a43024b0223f800d55d9
-
SHA512
139b86d6739fb01631f9aaf437bde80383dfa67010f5d7fd23111f4d8048d4fa2fb32c0709fcae1c4d4e36fe90040ae6d273d755d15276b4bb3b41cffeeb0c9f
-
SSDEEP
1572864:v0whg2VaDZcejhSEQrqOaxM1BZ829PCfCpVFZgEDyzB2WybRvkR1O4n3Se:v22YDZcetSEQrqBxMLZF9KQZjDyzB2WB
Static task
static1
Behavioral task
behavioral1
Sample
111/360Safe+338511+n6bf58e0f9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
111/360Safe+338511+n6bf58e0f9e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
111/360Safe+338511+n6bf58e0f9e.exe
-
Size
94.2MB
-
MD5
1c85a9c4c105f309b0fafdac3179cd14
-
SHA1
da377b7b625b50c5d1bb88923bd49d5f9f392c9b
-
SHA256
4b467317023c8e489c02c77e18022420f8bef1ce5e2e99c7668d336d047bcf0a
-
SHA512
08f57d6a3cb150f75d833f5cd015e8e25fafeaee4f729b8d834937943f2db3c4e4c8bc8492da8aef73ea3394fb6904214c68edab9a865a6bb3d8987603307e2c
-
SSDEEP
1572864:H5m6ZDSq2SFdBzc9g3m+6dEQaWQqoZDKI0QE4czB6imbiS79aQJsG6sw:cKSq2mdBagW+6dRmoN61d9UGfw
-
Modifies security service
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies boot configuration data using bcdedit
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Looks for VMWare services registry key.
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1