Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:01
Static task
static1
Behavioral task
behavioral1
Sample
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
Resource
win10v2004-20220721-en
General
-
Target
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
-
Size
348KB
-
MD5
34d1dc2e81e5547d79a51f62b05dee3a
-
SHA1
679ab050deaf4f32844bacfb24ed35de1c07bf8f
-
SHA256
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545
-
SHA512
91e56091907dcb653596d3d5df2770cc738156d6a8c808bd32aa603e1f1dbfb137c1007d788999c3eb2a353116943ce1cbde0d323e7e22c17042cb64af90b1fa
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exedescription ioc process File created C:\Windows\Tasks\EatRight.job 5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe