General
-
Target
main.exe
-
Size
7.2MB
-
Sample
250214-gca3xstphr
-
MD5
75a4c4a393ab704900d4e7b03928a898
-
SHA1
6d252c3503f74df28a52aa86821fba3e7b2b4c1c
-
SHA256
81ae30c871efc3f21a830d2c5d43a3b8067affbd43cee6cdaac71828a3501458
-
SHA512
cf80b32fec27e41cb00bcddecebad2a59d456b8eef0bb101c8334c92db8da615ac7164bff9441eac499e59bcc72cc52ef01635bd69185561534ed7ba954a7baa
-
SSDEEP
98304:ssJ/V6N+13gH5z4voNLZmjuAOZw3IvDiUFo0yfgdSiU8XvAx4aLZYyvJ83RxnPGA:b/35gZVHAr3hcdSyIx4ALiHPJd17YO
Static task
static1
Behavioral task
behavioral1
Sample
main.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
7.2MB
-
MD5
75a4c4a393ab704900d4e7b03928a898
-
SHA1
6d252c3503f74df28a52aa86821fba3e7b2b4c1c
-
SHA256
81ae30c871efc3f21a830d2c5d43a3b8067affbd43cee6cdaac71828a3501458
-
SHA512
cf80b32fec27e41cb00bcddecebad2a59d456b8eef0bb101c8334c92db8da615ac7164bff9441eac499e59bcc72cc52ef01635bd69185561534ed7ba954a7baa
-
SSDEEP
98304:ssJ/V6N+13gH5z4voNLZmjuAOZw3IvDiUFo0yfgdSiU8XvAx4aLZYyvJ83RxnPGA:b/35gZVHAr3hcdSyIx4ALiHPJd17YO
-
UAC bypass
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1