Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066.exe
Resource
win10v2004-20220812-en
General
-
Target
b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066.exe
-
Size
343KB
-
MD5
6258ad529d1e33c594aee7161deac955
-
SHA1
a4f0082fbfbe5ae4c5dbf20a5a941a1f45e519bc
-
SHA256
b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066
-
SHA512
1904b12e7aac43f0663f2b6e707b00f23e6200e525654f6efa32072d5b0f3de2c0517187b1507f85c1bfbeb3c0a1bc913f4607a10cba83f064a85abf4a35adbf
-
SSDEEP
6144:d+V3ekuO7dedkhY9+/imD+Gd7q/dHCUzi2kdpH3AR8gjq7p95F5zWV:d+5ewRgFJdHNidpHwhq7pP6V
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\EnergySaver.job b9609863b965cdf907ac04007467105d8fefe828c139efaf5f9b7c0415280066.exe