General
-
Target
image_2025-03-28_204056178.png
-
Size
7KB
-
Sample
250328-zgc27a1vh1
-
MD5
daf0a316fba7e913fe8305e4c8a53205
-
SHA1
0556975b72209b8067fd5b09ae21fa9c1bade785
-
SHA256
fe1fd2bb77618fa06e548283188cf3696acc9dd2d8a4c3f4e03560f3dddc3103
-
SHA512
e6fdaa9709f1a5a2a28eedeff4934f6060086f5eb60d4c9d576957c52d2c64fa43f475d44ceeb42cd5138a6dcafdadfef273817da1b19a3ab21e8ba1316f8f6e
-
SSDEEP
96:X2fEYr0GPuMnGuwrwfHYF9scngjmij+cf1uq9cy+Sxwn2xcViPvcGcos2P/sIZw+:mEazpG/Ok9Xg0y9C2XzPjP/ccVas3Hwc
Static task
static1
Behavioral task
behavioral1
Sample
image_2025-03-28_204056178.png
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
image_2025-03-28_204056178.png
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
image_2025-03-28_204056178.png
-
Size
7KB
-
MD5
daf0a316fba7e913fe8305e4c8a53205
-
SHA1
0556975b72209b8067fd5b09ae21fa9c1bade785
-
SHA256
fe1fd2bb77618fa06e548283188cf3696acc9dd2d8a4c3f4e03560f3dddc3103
-
SHA512
e6fdaa9709f1a5a2a28eedeff4934f6060086f5eb60d4c9d576957c52d2c64fa43f475d44ceeb42cd5138a6dcafdadfef273817da1b19a3ab21e8ba1316f8f6e
-
SSDEEP
96:X2fEYr0GPuMnGuwrwfHYF9scngjmij+cf1uq9cy+Sxwn2xcViPvcGcos2P/sIZw+:mEazpG/Ok9Xg0y9C2XzPjP/ccVas3Hwc
-
Modifies WinLogon for persistence
-
UAC bypass
-
Disables RegEdit via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
4