Analysis
-
max time kernel
179s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 10:49
Static task
static1
Behavioral task
behavioral1
Sample
bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe
Resource
win10v2004-20220812-en
General
-
Target
bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe
-
Size
340KB
-
MD5
1abe4e8e4406bab84a2259e0e3ad4d84
-
SHA1
91674d3072f2ad7c19b55ef0ac9d744307222b5a
-
SHA256
bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f
-
SHA512
963f8bfc940cb410dd5ee84a4f5225f0cc60fa2e63ab19e2f7430424c2b6ccfe8467f0294bd0e671785e9adaa88971e6e832224c01e47f0e8884257dc516156f
-
SSDEEP
6144:M0yJCI8vCb/Y8/eU6+9m4tU0rEXNG2fbro:M78eTePXj0ryNLbro
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\StyleChat.job bd59101ba4f2c12cd0c717836895517f7ddb07cf0330d97680c9f1d92ac96c5f.exe