Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 22:00
Static task
static1
Behavioral task
behavioral1
Sample
578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exe
Resource
win10v2004-20220721-en
General
-
Target
578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exe
-
Size
258KB
-
MD5
08ce4673e80622649980dc275df6ce7d
-
SHA1
cf1183a4866855fe6d2f1195294c7c911cce07cd
-
SHA256
578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd
-
SHA512
a98a4002a9a976c986afe3ecd7450e29232c591c053269126a2a8cb469b0c06899aa12cea029f5cb814f65f4b823bd2badc4cdc2e81f419d752ccffd04acbdb1
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exe -
Drops file in Windows directory 1 IoCs
Processes:
578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exedescription ioc process File created C:\Windows\Tasks\StyleChat.job 578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd.exe