General
-
Target
pzawovtjthaq.exe
-
Size
2.8MB
-
Sample
250127-sdgsmstnhw
-
MD5
686954102621e68218ae11fda60136a8
-
SHA1
e2b9c498f008f61729f0522b1b92c581acbf3c80
-
SHA256
a8ae600d922f800e997019b60fe446a5a4d7b126981791963616bb0e3fa470b5
-
SHA512
952cac8c0de0a5a115749692dbbb9574cc7dd4921915284c08b010642c4b0beb8952e6c1fe9b33830c82c79803b1e8e40d55fc2723db2f4ed44c0de5c9fadc3c
-
SSDEEP
49152:ZF30uanSb/rjYT3UzJCaew6ue35rSLZfJC0qb7VGbJn3kYTB:ZFBvRJCaburcqb0J3kc
Static task
static1
Behavioral task
behavioral1
Sample
pzawovtjthaq.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pzawovtjthaq.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
pzawovtjthaq.exe
-
Size
2.8MB
-
MD5
686954102621e68218ae11fda60136a8
-
SHA1
e2b9c498f008f61729f0522b1b92c581acbf3c80
-
SHA256
a8ae600d922f800e997019b60fe446a5a4d7b126981791963616bb0e3fa470b5
-
SHA512
952cac8c0de0a5a115749692dbbb9574cc7dd4921915284c08b010642c4b0beb8952e6c1fe9b33830c82c79803b1e8e40d55fc2723db2f4ed44c0de5c9fadc3c
-
SSDEEP
49152:ZF30uanSb/rjYT3UzJCaew6ue35rSLZfJC0qb7VGbJn3kYTB:ZFBvRJCaburcqb0J3kc
Score10/10-
Modifies security service
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Sets service image path in registry
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2