Analysis
-
max time kernel
33s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe
Resource
win10v2004-20220901-en
General
-
Target
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe
-
Size
322KB
-
MD5
7e1bf2ec58fd4f5ea1993b5af2452c47
-
SHA1
504f662c0a764683538cd385aac0361d6fbed72c
-
SHA256
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b
-
SHA512
f15acc31b5a5ca95124612c21968c7ee972dd0b99c963804edfb96cc22511a61c833be263308d5831c5e06dab3d18cd7f52b2f8ba4e72d4d2cc81f96b3bc10e5
-
SSDEEP
6144:R6HAoHo8HStX06JgkGcGhENgafewgws4OA19dSjCVGgh:AHAUL6ikvGhMfeE0A/dSOVNh
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SmoothRecorder.job c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe