Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e.exe
Resource
win10v2004-20220812-en
General
-
Target
f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e.exe
-
Size
373KB
-
MD5
7d3630310aa310b6d6af7a7ad8b4a894
-
SHA1
725c39aa7541b0d8cefe94f6b5363197a0252625
-
SHA256
f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e
-
SHA512
8ea2ee1293e082527eed7c21db7dcf02a75380e60c63653d355d96b74b0f14d04ec737eeb0dc4abc23e5ee123e492e1d6b6672b20b591ecbbb0df646329b18f7
-
SSDEEP
6144:lI81rDRskFSNTam6HMQeBQPY7ynZWcbcMq2zwReJHcdH7pRHKu:q8pc2m+MQ+QBwcbdnKjH7vKu
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\TouchCode.job f1b427f0a76dd1379f6657179cd2be3e1bb0a3a1f762dae641643d768f71f64e.exe