General
-
Target
4. Exploited; setting boundaries and getting help Y10 (1).pptx
-
Size
169.7MB
-
Sample
250124-kfcyga1jgk
-
MD5
62911683f5d3dd161fbd98cbb9fad4a5
-
SHA1
9f3b276dbe4de06e50f67785679b6ae6fc854069
-
SHA256
b2f036d7fe74586b0194ea6b4c83fd98b728626a4f7995fd4e5069ba6c1b35a5
-
SHA512
c29e6053693bfe4dd9fc6bf01af5f8c4294a69b8a4f133d0188f3e5a338b22034a7c741e9af937c7be540b77ce1f7cfd7962d39e6d9cb52892016506578e09a7
-
SSDEEP
3145728:qzHImWDjD48RhBLjYetbJZAHXlQBE5Jgam38vROyoMW0otTs79W69S71p29i:c5ejDfRhBfY+bPAHXlQGvg3xdMW0oxsy
Static task
static1
Behavioral task
behavioral1
Sample
4. Exploited; setting boundaries and getting help Y10 (1).pptx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4. Exploited; setting boundaries and getting help Y10 (1).pptx
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
4. Exploited; setting boundaries and getting help Y10 (1).pptx
-
Size
169.7MB
-
MD5
62911683f5d3dd161fbd98cbb9fad4a5
-
SHA1
9f3b276dbe4de06e50f67785679b6ae6fc854069
-
SHA256
b2f036d7fe74586b0194ea6b4c83fd98b728626a4f7995fd4e5069ba6c1b35a5
-
SHA512
c29e6053693bfe4dd9fc6bf01af5f8c4294a69b8a4f133d0188f3e5a338b22034a7c741e9af937c7be540b77ce1f7cfd7962d39e6d9cb52892016506578e09a7
-
SSDEEP
3145728:qzHImWDjD48RhBLjYetbJZAHXlQBE5Jgam38vROyoMW0otTs79W69S71p29i:c5ejDfRhBfY+bPAHXlQGvg3xdMW0oxsy
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1