Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 20:45
Static task
static1
Behavioral task
behavioral1
Sample
5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969.exe
Resource
win10v2004-20220812-en
General
-
Target
5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969.exe
-
Size
316KB
-
MD5
643d0061c0d033cdd59bf04b33158319
-
SHA1
aa28237286fb32df0487ae8e9b64989101fffacf
-
SHA256
5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969
-
SHA512
3c5d2efd6e02967054a6bb94ad916e2d76e8cacff73d586ad78dd5617c70d589046ff3d01792ab53fbac4fa8227fb7e428bc8ed7a9acf5a8ffccdd094a717398
-
SSDEEP
6144:UB4K2iXyuk2Y+YBnx35DB5CnMbuLZho3dp:UB4BNhrt1pB5CnHoNp
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\CoolFX.job 5254de5b255954832a7ae5f2c0727dceb327d5d5b73b40624a6d62f193e18969.exe