Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 13:12
Static task
static1
Behavioral task
behavioral1
Sample
1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3.exe
Resource
win10v2004-20220812-en
General
-
Target
1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3.exe
-
Size
342KB
-
MD5
7226b0d28a5fcd9f185e330ad5dea9e6
-
SHA1
f1ee60bd00f6ba6cf39df00565530e1bac9743dc
-
SHA256
1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3
-
SHA512
08451695e26aabc10b095537a31e72084cb62d13321297b672043a2f7283ddba90613e2639777ee96a85b6d03e430dd1decff3c1e8daaa14c795fe300005a7ba
-
SSDEEP
6144:GM2S5SU9oLc5wE8wlzeUC9f6X6rMngi2tUZzsHdmBu3za5OpvEfHggoHMXiurq:f2GYInFBS9f6+MngFtIs93za5OpcZoek
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\PasswordChain.job 1c8945f49850226bb712e0d37be56969769c58101b7136eb95aa268a1f08fcd3.exe