Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f.exe
Resource
win10v2004-20220812-en
General
-
Target
118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f.exe
-
Size
259KB
-
MD5
19dc4349260fb55b8e0f6a6215600b1c
-
SHA1
e9e0d71f97aaf4d9b60eea1bc3aa07bf7c6b3c2f
-
SHA256
118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f
-
SHA512
8fde107d217fc4b1240ff8f1eb45b23085770accc4116d81aac5c102b804c8ed59253e9808e8c80c7ecf1ebead1a93ba78c68e6eaa6e14ced860aa0bc788690e
-
SSDEEP
6144:niYrrHIba6TBZJi/qzcfA6CBDN/7DCMf7/q:iqLIZuiQI6MDCMf7/q
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\AccuDictation.job 118c0f56f5a152c71dac6482308d138c83b2d715c64f2e50417ca26ced9d1e5f.exe