Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f.exe
Resource
win10v2004-20220901-en
General
-
Target
5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f.exe
-
Size
258KB
-
MD5
3deebfc58d4c7e7f0b73224b1ae96846
-
SHA1
ce9cde28fc0655fb7375741674127262f95d5dc5
-
SHA256
5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f
-
SHA512
46bf34f61a962fbfa1d3e390f403f29ccc665605cf4c3ca8a3478c709a734d17fac0fbde65b0e41b24592fac075b208ef97e6a6af673e0b2ba3db76c128d0161
-
SSDEEP
3072:0sm6DkCCvejdYeO5jwA4gZExUXnV3xqXivXioYDUuw+yCTBydE7J8DVHI:5DkFcdxSeUXV3sSvyvDUj6h7UVHI
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MagicCast.job 5d236ae1c9fcbfe8cc77b0981b4321ba5c83da0c776dd0f1e306643f6196c46f.exe