General
-
Target
svtrnTsSnw
-
Size
10KB
-
Sample
250114-f5kbmazpbk
-
MD5
5b1d431b0609e5f42b78a84dff3700ab
-
SHA1
5b7deaedef73dda7a83f573b33d66ffb22add347
-
SHA256
856a3fa141a74a7040438ec8a7b270bc9f71f7babb93b7c41510d4f347ec21c9
-
SHA512
945c1d563b46372044e8498fa5aaefc3db02c6a89fcf29af23ae8165f3be8974e72e54fc1938065031b8439c79268152732ddcd3afba3148639d51a138d468c1
-
SSDEEP
96:U0S0l0XsWUBRUM2OfRrcLILjRe5mvtgCsXe5oEQk/5nx/IJ:71GXJU3RrcEUoVNQsnx/0
Static task
static1
Behavioral task
behavioral1
Sample
svtrnTsSnw.html
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
https://e.letscompress.online/update.txt
Targets
-
-
Target
svtrnTsSnw
-
Size
10KB
-
MD5
5b1d431b0609e5f42b78a84dff3700ab
-
SHA1
5b7deaedef73dda7a83f573b33d66ffb22add347
-
SHA256
856a3fa141a74a7040438ec8a7b270bc9f71f7babb93b7c41510d4f347ec21c9
-
SHA512
945c1d563b46372044e8498fa5aaefc3db02c6a89fcf29af23ae8165f3be8974e72e54fc1938065031b8439c79268152732ddcd3afba3148639d51a138d468c1
-
SSDEEP
96:U0S0l0XsWUBRUM2OfRrcLILjRe5mvtgCsXe5oEQk/5nx/IJ:71GXJU3RrcEUoVNQsnx/0
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1