General
-
Target
xyz4568.rar
-
Size
446KB
-
Sample
250209-chp2ta1qcw
-
MD5
7209e82cdcd08153f44154f6d3410df0
-
SHA1
1efbdd58981ab71b3f2ba21ce66e42b927c5e118
-
SHA256
ee15fc4641362985d0214b9247d65eebc2203cef38ae9a85b2c3eab3f9f6d45a
-
SHA512
5e79997581ea4e88c294f83289cff47e03abe462bd310b5ea5e59a487fab1e5cae881d38091f024804089d3a4d39e0294ac9c6c8588c5412a4b5a2ea684e3c2b
-
SSDEEP
6144:fMT0R8QgeWLa+eVi0pIt28iPKB+Rusx8ok15lR0UY448EPQUJS+Yui1RUcRFZoT2:fn8yWSMa5vPrRh8D1v3Yt8iUGcN4cg8Z
Behavioral task
behavioral1
Sample
xyz4568/dControl.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral2
Sample
xyz4568/dControl.exe
Resource
win10ltsc2021-20250207-en
Malware Config
Targets
-
-
Target
xyz4568/dControl.exe
-
Size
447KB
-
MD5
58008524a6473bdf86c1040a9a9e39c3
-
SHA1
cb704d2e8df80fd3500a5b817966dc262d80ddb8
-
SHA256
1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
-
SHA512
8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
SSDEEP
6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD
-
Modifies security service
-
Windows security bypass
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Windows security modification
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
4Indicator Removal
1Clear Persistence
1Modify Registry
8