Analysis
-
max time kernel
111s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe
Resource
win10v2004-20220901-en
General
-
Target
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe
-
Size
322KB
-
MD5
7e1bf2ec58fd4f5ea1993b5af2452c47
-
SHA1
504f662c0a764683538cd385aac0361d6fbed72c
-
SHA256
c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b
-
SHA512
f15acc31b5a5ca95124612c21968c7ee972dd0b99c963804edfb96cc22511a61c833be263308d5831c5e06dab3d18cd7f52b2f8ba4e72d4d2cc81f96b3bc10e5
-
SSDEEP
6144:R6HAoHo8HStX06JgkGcGhENgafewgws4OA19dSjCVGgh:AHAUL6ikvGhMfeE0A/dSOVNh
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SmoothRecorder.job c7be99707781b0418ec12155851314ddc020b1cea1681b375780ea7470ed473b.exe