Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036.exe
Resource
win10v2004-20220812-en
General
-
Target
26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036.exe
-
Size
385KB
-
MD5
4c33c5c08976e79896f3eea722ac43cd
-
SHA1
055b19dbcbbe7e03ba898d81256ac417efbb2402
-
SHA256
26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036
-
SHA512
3cea1ce2e44ebc2e5c4687f4a90316aa21d2ced21e5cda5677f8f95ea48d980d3ff315524dc109ebf31e4c01de356645288a739f904ec58d75bebd87c8658854
-
SSDEEP
12288:LlhUTMP/euvawkq/0x6k4wQiHygbirDzd:peNuCwZM6h4HygbinR
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MrFixer.job 26f3af2a5fb979a45d5032ea260c57b5135a9fff7de9bb367000c402e5794036.exe