Analysis
-
max time kernel
35s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea.exe
Resource
win10v2004-20220901-en
General
-
Target
4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea.exe
-
Size
228KB
-
MD5
80202f6f238ee672208cf2d1c86a9bb0
-
SHA1
e0f6f0c1c86f7659148c1f820b1f699db1aa1c7e
-
SHA256
4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea
-
SHA512
0974329dfb0c3a18d47397889d8f330ab3ddff243ae858448bb85683b08dc81bbad459e163d2ee66abf1baba8a8d61649a6c8cc10b0a594e637e4da85bf74ded
-
SSDEEP
3072:cKYSNaYRJ9T0O82I/m41CLMAVm/vaXG17HVZbj7jflO0SqPCP32fHbswprs:cKYS7VR41c8/vvf/j40SqaPevprs
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Bidaily Synchronize Task[973b].job 4c0b7baa15c77d889bab62d30524fb71ee24a28b33c4f7c6bb20f240246c9eea.exe