General
-
Target
8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710.zip
-
Size
735KB
-
Sample
250128-q98vws1jes
-
MD5
2881431ec401c97769deab2162ef3b7c
-
SHA1
529ae605e3bd81f373278ce6cd0853bb07450ac6
-
SHA256
790fe3f399f96a9588f57b1221259869bb506a009e79d947cb7ec633698d4243
-
SHA512
8e5ecbaaf968ab08f3002f22075a06d05eb5d458dad66cf4351e7aaa74b84b18e48f92557931e8ec2f961a68bc766e21cfb5ef452e8c7162ba76f39c8007fda5
-
SSDEEP
12288:vfYCjYoLEEjdYgkqjBh1zMV4JUwdgQu2g2R3Q/EX8UlfmNo+6H8iqmP9ybQssY:vfTLEEjDkaGC9dg8g2R3WEXFmCH/Zl/Y
Static task
static1
Behavioral task
behavioral1
Sample
8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710.exe
-
Size
1.2MB
-
MD5
24c7a082a3712ad00cea6f1bfee81f9c
-
SHA1
67f06a9982358afdf69163b3fd642c231fa0a9c4
-
SHA256
8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710
-
SHA512
ad9097c842e517fa034e5abecb07851cad0d1e5c0433cc1765bf95ee20869d445290fc71e2d20bf7121f780c3336eb0c2397c20c7e8ee541dbf946061442b783
-
SSDEEP
24576:q7kybXvovms3JuIfILdzxtJzJOJTe87RMMeQjm:KMZJuIwLdNtJzJOJTJeQS
-
Betabot family
-
Modifies firewall policy service
-
UAC bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Looks for VMWare services registry key.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
1Clear Persistence
1Modify Registry
7Virtualization/Sandbox Evasion
1