Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:55
Static task
static1
Behavioral task
behavioral1
Sample
56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exe
Resource
win10v2004-20220721-en
General
-
Target
56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exe
-
Size
253KB
-
MD5
7df89bf9acbc92993a3e1ce56ac06621
-
SHA1
827edec82135e2dd7c80c90fa7ab8b03905bc6a5
-
SHA256
56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b
-
SHA512
ed63345e2f380dc5e75343312cc44ee9f845539d46d6ca89a3a4d5a9ef04f6e40f63894370bcbaf34684a970bb6ee490f5c885b0dc6090ea45d4790a4ced1ce5
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exe -
Drops file in Windows directory 1 IoCs
Processes:
56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exedescription ioc process File created C:\Windows\Tasks\XtremeFX.job 56142f28d4f2b73dbe87b438c3ced7453cf1044297077e16781ad1730aed866b.exe