General
-
Target
scenes i like.txt
-
Size
43B
-
Sample
250326-qvskcswtfv
-
MD5
9fb8c41a40b9fc3b57825d8acdaeb71f
-
SHA1
6d4a793f867088b9c44e321ae8add32c7d9148ff
-
SHA256
56387eb89c61959a06f8d96544dd4ca182fb17986b0fa3d139d7fb0d96c5080b
-
SHA512
dc3ef7a27d224dc2ad2fc6732f2c1c0d0b1b85288c28c42ac0262afa8068d17680497c6bbbe34ac9e3224b95091b9b23a80c6a0a93356806db1329bf7000c915
Static task
static1
Behavioral task
behavioral1
Sample
scenes i like.txt
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
scenes i like.txt
Resource
win11-20250314-en
Malware Config
Targets
-
-
Target
scenes i like.txt
-
Size
43B
-
MD5
9fb8c41a40b9fc3b57825d8acdaeb71f
-
SHA1
6d4a793f867088b9c44e321ae8add32c7d9148ff
-
SHA256
56387eb89c61959a06f8d96544dd4ca182fb17986b0fa3d139d7fb0d96c5080b
-
SHA512
dc3ef7a27d224dc2ad2fc6732f2c1c0d0b1b85288c28c42ac0262afa8068d17680497c6bbbe34ac9e3224b95091b9b23a80c6a0a93356806db1329bf7000c915
-
UAC bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2