Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00.exe
Resource
win10v2004-20220812-en
General
-
Target
afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00.exe
-
Size
343KB
-
MD5
5d46e91bda83ed570ff8ef8f0744ff72
-
SHA1
da5d50ab1e17bf37879183d95e7aa9d3692c8746
-
SHA256
afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00
-
SHA512
96c31fa1f1de59dfa5fcb940fb7c947d984c25ebc8e2e260097ab7a2f073f69049ea868e14c9d90aa30181c43075386f64f6129d3df8a4128ad6e9882830fc6b
-
SSDEEP
6144:WVz+V3e2KB0+CdkhY9+/imD+Gd7q/dHCUzi2kdpH3A7hDBerOovk:ez+5ebgFJdHNidpHw7FErpvk
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\VideoTime.job afb39b46df60faada293d96ae0403ce82eddb6e8d30990a79280ca28d0e06d00.exe