Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 06:10
Static task
static1
Behavioral task
behavioral1
Sample
560032353b341db593caeb017287341e00ace21e53b74eb99b0c122469348df5.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
560032353b341db593caeb017287341e00ace21e53b74eb99b0c122469348df5.exe
Resource
win10v2004-20220722-en
General
-
Target
560032353b341db593caeb017287341e00ace21e53b74eb99b0c122469348df5.exe
-
Size
222KB
-
MD5
4e3d8f9afe9d8b788cc59e0654479c08
-
SHA1
9f20901ef18f07d79ddbc977887e4bdb4a0db3e5
-
SHA256
560032353b341db593caeb017287341e00ace21e53b74eb99b0c122469348df5
-
SHA512
76da1dfe637a6081524a1b415a0bf75496b48dd9c248027ec5cd835ae622585a68ea98776aed3d47f012dcd1d104b081e59196c97df3edfac1f39e274c4d3b98
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
560032353b341db593caeb017287341e00ace21e53b74eb99b0c122469348df5.exedescription ioc process File created C:\Windows\Tasks\ChalkOut.job 560032353b341db593caeb017287341e00ace21e53b74eb99b0c122469348df5.exe