Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7.exe
Resource
win10v2004-20220812-en
General
-
Target
25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7.exe
-
Size
308KB
-
MD5
7c5fb2c72d7004d0f995d9bb846c016f
-
SHA1
c33794b870d6f0a6042dc8330ae1b42de04a6634
-
SHA256
25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7
-
SHA512
e124cb1ace0f908b8333db2e07a531b809c6c3785d64d11fba8d59af8b05fafc5439e4f3d38b21b7456f01e90ba2ef84fe5aa1fa1404a86c92746fb9d174d22d
-
SSDEEP
6144:i4JSkN/jbZlGxHinA/jerGvwbKNk4VMkdvu0F4:i4s6/XZlGgnAL2Gvw26GMUv5F4
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ConstellationGuide.job 25d82fe50c0b0433cedc0b003678f90faeff13d21bf540a933cb063e3e9e55c7.exe