Analysis
-
max time kernel
53s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 08:36
Static task
static1
Behavioral task
behavioral1
Sample
3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700.exe
Resource
win10v2004-20220812-en
General
-
Target
3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700.exe
-
Size
257KB
-
MD5
492b7e710fe66f72968433572f8b09d7
-
SHA1
f176d63aa8e4d3cc71af8a944c000c96a16ba7ee
-
SHA256
3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700
-
SHA512
7ba40a0ea66e8b4d36d200b7664e4dc9747e6b47428dccb6ceb3134b107d68fb1a5ffc3d2c4e354f9be7f99b4638d85935f187e15a0659ec85a7ca60668843ca
-
SSDEEP
6144:67Ffs0DUXolXmratgGet6XTBApGmf4iAxMb:6xL2oAra9jBYbAiAxMb
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\PHPTouch.job 3dc7dfca4f6ac98eb357c60fc960f03a3751710c997adee85b55181dd2e6e700.exe