Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:11
Behavioral task
behavioral1
Sample
4922a9fc41c93ea2dd0fc5703446697c7a1224a2bf18dc075244009c2cfee4c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4922a9fc41c93ea2dd0fc5703446697c7a1224a2bf18dc075244009c2cfee4c5.exe
Resource
win10v2004-20220812-en
General
-
Target
4922a9fc41c93ea2dd0fc5703446697c7a1224a2bf18dc075244009c2cfee4c5.exe
-
Size
195KB
-
MD5
036f4247008f15649f9625a1e2d24946
-
SHA1
9a1b9b4a96d6baf05269d0472e738519a74b3208
-
SHA256
4922a9fc41c93ea2dd0fc5703446697c7a1224a2bf18dc075244009c2cfee4c5
-
SHA512
1702125ff377d6c8fedfa29b88e91945e19ca83010362586b39af121d84d12edd986adb6352f5e388bfb93f50ad974504b6c4f62a0ed057b04bcdb7dc7530873
-
SSDEEP
6144:LWkUfz8kKbPNgbyeQE5TWZPrus7CLeM9/:Sf4pb14/5TSTHuLr9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1492-54-0x0000000000400000-0x0000000000447000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4922a9fc41c93ea2dd0fc5703446697c7a1224a2bf18dc075244009c2cfee4c5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4922a9fc41c93ea2dd0fc5703446697c7a1224a2bf18dc075244009c2cfee4c5.exe