General
-
Target
ef9f232e313d9dd77d7db51379f86c150c19373344bd27b592b1a803cfe9f8f5.exe
-
Size
2.2MB
-
Sample
250125-dd2eqatlep
-
MD5
02b4a52ec119d3cf966d70da67eb3cef
-
SHA1
b424858fe8871e2ca7b513f34f7568e4d04ec4cf
-
SHA256
ef9f232e313d9dd77d7db51379f86c150c19373344bd27b592b1a803cfe9f8f5
-
SHA512
3a1bedf763bb685be3d1712db82f9e201a0102956839ce3b31664b91a796eca92c41b606e2b7a6b95c5f43b0550a761b35f7458aac3f38c38b66dee621acabf7
-
SSDEEP
49152:GeZM+VKH/ZKhwqQtUWzpDMnOmB7ebA5rOYiZnS:7GWwvtt1jmxebSivZnS
Static task
static1
Behavioral task
behavioral1
Sample
ef9f232e313d9dd77d7db51379f86c150c19373344bd27b592b1a803cfe9f8f5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef9f232e313d9dd77d7db51379f86c150c19373344bd27b592b1a803cfe9f8f5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ef9f232e313d9dd77d7db51379f86c150c19373344bd27b592b1a803cfe9f8f5.exe
-
Size
2.2MB
-
MD5
02b4a52ec119d3cf966d70da67eb3cef
-
SHA1
b424858fe8871e2ca7b513f34f7568e4d04ec4cf
-
SHA256
ef9f232e313d9dd77d7db51379f86c150c19373344bd27b592b1a803cfe9f8f5
-
SHA512
3a1bedf763bb685be3d1712db82f9e201a0102956839ce3b31664b91a796eca92c41b606e2b7a6b95c5f43b0550a761b35f7458aac3f38c38b66dee621acabf7
-
SSDEEP
49152:GeZM+VKH/ZKhwqQtUWzpDMnOmB7ebA5rOYiZnS:7GWwvtt1jmxebSivZnS
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1