General
-
Target
vanish (1).exe
-
Size
7.5MB
-
Sample
250115-p1fx3svkhp
-
MD5
3a15cfe7fce7dbae2bbd7e2dfa9c8e92
-
SHA1
636288fb385e5a7aef9ae4c5dec176cf65f5f110
-
SHA256
9968a98c223ddd2825ac2c43a6a54de556880c2dbcd704bc5b14c1927e9ce0cc
-
SHA512
34d9b66c918f4d5356ecd4d4a4fe09cce682899f703569cecc531f6f519f6f3830e9c8b8b45e44f3efe36c6110cbe98401e5dce79150977093a445776caafe1f
-
SSDEEP
196608:X2gFm6wfI9jUC2gYBYv3vbWY+iITm1U6fd1Ek:vFiIH2gYBgDW/TOzbD
Behavioral task
behavioral1
Sample
vanish (1).exe
Resource
win10ltsc2021-20250113-en
Malware Config
Targets
-
-
Target
vanish (1).exe
-
Size
7.5MB
-
MD5
3a15cfe7fce7dbae2bbd7e2dfa9c8e92
-
SHA1
636288fb385e5a7aef9ae4c5dec176cf65f5f110
-
SHA256
9968a98c223ddd2825ac2c43a6a54de556880c2dbcd704bc5b14c1927e9ce0cc
-
SHA512
34d9b66c918f4d5356ecd4d4a4fe09cce682899f703569cecc531f6f519f6f3830e9c8b8b45e44f3efe36c6110cbe98401e5dce79150977093a445776caafe1f
-
SSDEEP
196608:X2gFm6wfI9jUC2gYBYv3vbWY+iITm1U6fd1Ek:vFiIH2gYBgDW/TOzbD
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1