General
-
Target
source_prepared.exe
-
Size
83.1MB
-
Sample
250209-xy3caszpb1
-
MD5
814dc1bea8267c6ae801342770484b0f
-
SHA1
677b96f1d6b95d7ce8043f22e1fa17a07c0f5729
-
SHA256
54688d6636962043c25c84278eddc01863a5a2d43a57e00e1b33d519ad2924c6
-
SHA512
1821be5eb0d44b90ae899fadf3f1243573a396b986a5495b183ca2fe7b1523dc7eeaaf6c94f1756b42fd5204e8453c5db6ae6232877d05d796c98b57a6b75c1b
-
SSDEEP
1572864:xVjlVWU6eFm7OkiqOv8im2ARxE71lhpBB8iYweyJulZUdgP7mNhDzcv7ZH1O3:jb0eFm7OknOv8i3KGLpnNpur7ihnOrO3
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
83.1MB
-
MD5
814dc1bea8267c6ae801342770484b0f
-
SHA1
677b96f1d6b95d7ce8043f22e1fa17a07c0f5729
-
SHA256
54688d6636962043c25c84278eddc01863a5a2d43a57e00e1b33d519ad2924c6
-
SHA512
1821be5eb0d44b90ae899fadf3f1243573a396b986a5495b183ca2fe7b1523dc7eeaaf6c94f1756b42fd5204e8453c5db6ae6232877d05d796c98b57a6b75c1b
-
SSDEEP
1572864:xVjlVWU6eFm7OkiqOv8im2ARxE71lhpBB8iYweyJulZUdgP7mNhDzcv7ZH1O3:jb0eFm7OknOv8i3KGLpnNpur7ihnOrO3
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1Discovery
File and Directory Discovery
1Peripheral Device Discovery
1Query Registry
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1