Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 06:16
Static task
static1
Behavioral task
behavioral1
Sample
55f89d5ff4ef6c188988b15dafdbd056dd36b5e6a647a354c9c8e038ecf169fc.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
55f89d5ff4ef6c188988b15dafdbd056dd36b5e6a647a354c9c8e038ecf169fc.exe
Resource
win10v2004-20220721-en
General
-
Target
55f89d5ff4ef6c188988b15dafdbd056dd36b5e6a647a354c9c8e038ecf169fc.exe
-
Size
234KB
-
MD5
07770ac58a5e59c6853067387614447c
-
SHA1
a28d125e1e53c2571537447d34174f581a71b7d4
-
SHA256
55f89d5ff4ef6c188988b15dafdbd056dd36b5e6a647a354c9c8e038ecf169fc
-
SHA512
36bda54c6aba837f87ac8e70c7458b7571313df3db457cf42305a91cc7c5119b6ab1d0230040c56ddc730700bfa87df5282264929925b08c34f699ff51d42346
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Drops file in Windows directory 1 IoCs
Processes:
55f89d5ff4ef6c188988b15dafdbd056dd36b5e6a647a354c9c8e038ecf169fc.exedescription ioc process File created C:\Windows\Tasks\DareToTravel.job 55f89d5ff4ef6c188988b15dafdbd056dd36b5e6a647a354c9c8e038ecf169fc.exe