General
-
Target
officedeploymenttool_18526-20146.exe
-
Size
3.6MB
-
Sample
250313-xwxc9szye1
-
MD5
a1576dce7145a4281ba4275d423d24e9
-
SHA1
913f92412b8b73e004592fe7d34351869f383fd0
-
SHA256
3d1936ecf7d89847f3c94132f828bfe0beca401a5b0877ab2e0253a8571e6508
-
SHA512
7a96e55b38c29d5ce3120bc237536a9df4efeb8e61ad2b58fdc4b31f9edab6ebe7cb03ef762a14dbad01fb6e9955ac7e9bce88ec4312ea17787be9f1dd0573f5
-
SSDEEP
49152:meNKDks7EkzW11Q9nEQOpNb1D8ljsSJ9Y7coqTY5JiLfhdfP6BYdY4C/UmGc18sk:mKKJEIaUxOpM/JvE5MzrKmeFP18sk
Static task
static1
Behavioral task
behavioral1
Sample
officedeploymenttool_18526-20146.exe
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
officedeploymenttool_18526-20146.exe
-
Size
3.6MB
-
MD5
a1576dce7145a4281ba4275d423d24e9
-
SHA1
913f92412b8b73e004592fe7d34351869f383fd0
-
SHA256
3d1936ecf7d89847f3c94132f828bfe0beca401a5b0877ab2e0253a8571e6508
-
SHA512
7a96e55b38c29d5ce3120bc237536a9df4efeb8e61ad2b58fdc4b31f9edab6ebe7cb03ef762a14dbad01fb6e9955ac7e9bce88ec4312ea17787be9f1dd0573f5
-
SSDEEP
49152:meNKDks7EkzW11Q9nEQOpNb1D8ljsSJ9Y7coqTY5JiLfhdfP6BYdY4C/UmGc18sk:mKKJEIaUxOpM/JvE5MzrKmeFP18sk
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indicator Removal
1Clear Persistence
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1