General
-
Target
Built.exe
-
Size
7.4MB
-
Sample
250210-wy1m2a1lbn
-
MD5
1180a2369c7c67cf88c11d79db3050b9
-
SHA1
5906f9cf24d5c87b408f4fc17c9b7f2867430ef7
-
SHA256
2c1599ce9dc98d6ba85eb8f1d90a8d784dcfea8ed165e24560094a3408e1619b
-
SHA512
2bd1b4cc8bc20c7b90e9c9fdfb01b8684c3ec8307918dc3b46f7585868355ee3e0a467089b0c87865469fd2ebde4b0b3aa4f9dda4e665f08c220e66ea39fefc0
-
SSDEEP
196608:NWL0cDNP59Ljv+bhqNVoBKUh8mz4Iv9PPv1DVWhM:XiNPvL+9qz8/b4IRv3WhM
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10ltsc2021-20250207-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.4MB
-
MD5
1180a2369c7c67cf88c11d79db3050b9
-
SHA1
5906f9cf24d5c87b408f4fc17c9b7f2867430ef7
-
SHA256
2c1599ce9dc98d6ba85eb8f1d90a8d784dcfea8ed165e24560094a3408e1619b
-
SHA512
2bd1b4cc8bc20c7b90e9c9fdfb01b8684c3ec8307918dc3b46f7585868355ee3e0a467089b0c87865469fd2ebde4b0b3aa4f9dda4e665f08c220e66ea39fefc0
-
SSDEEP
196608:NWL0cDNP59Ljv+bhqNVoBKUh8mz4Iv9PPv1DVWhM:XiNPvL+9qz8/b4IRv3WhM
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1