Analysis
-
max time kernel
166s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 05:07
Static task
static1
Behavioral task
behavioral1
Sample
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
Resource
win10v2004-20220721-en
General
-
Target
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
-
Size
207KB
-
MD5
4ae0ff18081fba1fbccd2b8acfa6b5c6
-
SHA1
83168dd947c574452f3cc46d7598e73da6f10124
-
SHA256
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d
-
SHA512
002f0afe183c5772ba387a8907795bc6e77034908b01df632ab2b77931137990ed7b0b2bcf20e2b4bd471636e157f322cf9fe2130ec7713086abdd3b2fe9fa48
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Drops file in Windows directory 1 IoCs
Processes:
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exedescription ioc process File created C:\Windows\Tasks\FreeTracks.job 562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe