General
-
Target
shp.scr
-
Size
214KB
-
Sample
250330-1je51azmy8
-
MD5
c8b7cf2daca05d5cdaa31939c553b1db
-
SHA1
315c8b4f3719296bfff8e40b01f0d758e13122a3
-
SHA256
2d951b1400ebf4f754965f4e9060b68c3c7fe3d4c2fca75ea564f9d9b79de09b
-
SHA512
6e56a8c0c675dd9e525b4bee0ad9b7fe5820d15592d1773098d61c0d35a4e3f5460e4a76af57e94068b17ab9c38bbd571cae3da699dfe4426cb19112ad452965
-
SSDEEP
6144:dldk1cWQRNTB1M8HySSzCF9NoA/EusgXyAyW:dcv0NTXxH+zkRjskyAyW
Static task
static1
Behavioral task
behavioral1
Sample
shp.scr
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
shp.scr
-
Size
214KB
-
MD5
c8b7cf2daca05d5cdaa31939c553b1db
-
SHA1
315c8b4f3719296bfff8e40b01f0d758e13122a3
-
SHA256
2d951b1400ebf4f754965f4e9060b68c3c7fe3d4c2fca75ea564f9d9b79de09b
-
SHA512
6e56a8c0c675dd9e525b4bee0ad9b7fe5820d15592d1773098d61c0d35a4e3f5460e4a76af57e94068b17ab9c38bbd571cae3da699dfe4426cb19112ad452965
-
SSDEEP
6144:dldk1cWQRNTB1M8HySSzCF9NoA/EusgXyAyW:dcv0NTXxH+zkRjskyAyW
Score10/10-
UAC bypass
-
Disables Task Manager via registry modification
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3