General
-
Target
Application Frame Host.exe
-
Size
83.3MB
-
Sample
250212-w33yyssnay
-
MD5
fa86c3e525f23bbd54720cbfd096f7c7
-
SHA1
3b4357e3cb453de8293dd789262a969e9ec4f4f2
-
SHA256
24c75b4e9fcaaaa8f9da6f469a594999838eab930baa00cdb926133216c337cc
-
SHA512
78ddc5de25f3d9b5d4b3d54e86b67500ff38b608f7f5334236038aac1e878f9eb5ef6d4ad4f2205c7b5c7f071e4b7d6ef9621e8d360464dff0eb16748c737ca4
-
SSDEEP
1572864:HdbVlkIWnHOkiqOv8im2AO2SE7WxmlKUiY4MHHLeqPNLtDNMgZFAyNK:HdpWIoHOknOv8i352ixmMvMHVLtxT84
Behavioral task
behavioral1
Sample
Application Frame Host.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral2
Sample
Application Frame Host.exe
Resource
win11-20250211-en
Malware Config
Targets
-
-
Target
Application Frame Host.exe
-
Size
83.3MB
-
MD5
fa86c3e525f23bbd54720cbfd096f7c7
-
SHA1
3b4357e3cb453de8293dd789262a969e9ec4f4f2
-
SHA256
24c75b4e9fcaaaa8f9da6f469a594999838eab930baa00cdb926133216c337cc
-
SHA512
78ddc5de25f3d9b5d4b3d54e86b67500ff38b608f7f5334236038aac1e878f9eb5ef6d4ad4f2205c7b5c7f071e4b7d6ef9621e8d360464dff0eb16748c737ca4
-
SSDEEP
1572864:HdbVlkIWnHOkiqOv8im2AO2SE7WxmlKUiY4MHHLeqPNLtDNMgZFAyNK:HdpWIoHOknOv8i352ixmMvMHVLtxT84
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1