General
-
Target
31195.exe
-
Size
3.1MB
-
Sample
250121-dfh16aspep
-
MD5
797a4c7fdccda03db763af03f52c116c
-
SHA1
10e1d67db7c6f817d6a5e3ac923af5f92441bcd9
-
SHA256
28d47f653cda2699e54ed54809af2587dd1de04df5cec184c0c5f9dc15bf26d7
-
SHA512
5e4ea803325d97599627ac4f9f61d29964000987ac12852b052dbafb95448ab8a161dbee2630abe47a7b9d3e1bc9d732bf38b51ba6fd7981c1aa2bf6c0886121
-
SSDEEP
98304:PxZznhCqdg33WJLX6TX9HzDaokj4R7Uld1ufXSs:PxlUQlzmX9HzODjW6d1ISs
Static task
static1
Behavioral task
behavioral1
Sample
31195.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31195.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
31195.exe
-
Size
3.1MB
-
MD5
797a4c7fdccda03db763af03f52c116c
-
SHA1
10e1d67db7c6f817d6a5e3ac923af5f92441bcd9
-
SHA256
28d47f653cda2699e54ed54809af2587dd1de04df5cec184c0c5f9dc15bf26d7
-
SHA512
5e4ea803325d97599627ac4f9f61d29964000987ac12852b052dbafb95448ab8a161dbee2630abe47a7b9d3e1bc9d732bf38b51ba6fd7981c1aa2bf6c0886121
-
SSDEEP
98304:PxZznhCqdg33WJLX6TX9HzDaokj4R7Uld1ufXSs:PxlUQlzmX9HzODjW6d1ISs
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Server Software Component: Terminal Services DLL
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Modifies WinLogon
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Users
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1