Analysis
-
max time kernel
136s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca.exe
Resource
win10v2004-20220812-en
General
-
Target
6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca.exe
-
Size
316KB
-
MD5
7cfbe54cbc26e7af543e2a2738ca916a
-
SHA1
d4496dfe17506761c851697f678ea6601f3b8896
-
SHA256
6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca
-
SHA512
1ddf0f8b1cc17beb8a5d238dff3eea1cf2be26b6e121353f244dbe091c78e56b7d34e575e08f8f1ffc6251ea769d00010c90b42cc63b99e10e817eda0481c3ab
-
SSDEEP
6144:DC1Vp/euRgoMhLZDEk3wbn640sFvS6e430LHydznsAHZA:DC1VpmQRMh9b6nXtS8qHydznvA
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DailyCast.job 6464aee8d58262af78eb5c08be9effa4510a8fde07b2a90230df9c260939bcca.exe