General
-
Target
nuevo pedido#23785.exe
-
Size
430KB
-
Sample
220124-m849jaedb8
-
MD5
45fe143aec6a446a2bfec96054dc923c
-
SHA1
a00719ef783406b10e44962ee6869e6a6fcc9e0d
-
SHA256
71cd3e3afcd5a2df4cc2092f8724b24c6a8cc7e6f44f77cc8174dac0a565f98b
-
SHA512
97967ad8de22d724541b985e0beb9ac68a5bfd2884df5d408fca79318dd9259e801dcfbddaacaf34bdc25128a1a00af78230bf818ce5c24b1ae3b18c545e540b
Static task
static1
Behavioral task
behavioral1
Sample
nuevo pedido#23785.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
nuevo pedido#23785.exe
-
Size
430KB
-
MD5
45fe143aec6a446a2bfec96054dc923c
-
SHA1
a00719ef783406b10e44962ee6869e6a6fcc9e0d
-
SHA256
71cd3e3afcd5a2df4cc2092f8724b24c6a8cc7e6f44f77cc8174dac0a565f98b
-
SHA512
97967ad8de22d724541b985e0beb9ac68a5bfd2884df5d408fca79318dd9259e801dcfbddaacaf34bdc25128a1a00af78230bf818ce5c24b1ae3b18c545e540b
Score10/10-
Looks for VirtualBox Guest Additions in registry
-
Adds policy Run key to start application
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Program crash
-
Suspicious use of SetThreadContext
-