Analysis
-
max time kernel
16s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d.exe
Resource
win10v2004-20220901-en
General
-
Target
6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d.exe
-
Size
323KB
-
MD5
a10767004e4ec5bb339c536e6693969c
-
SHA1
94e064796b48dc773ee0d46cc5fd63668a61ca95
-
SHA256
6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d
-
SHA512
3e69a4230206a0a81fe2337a0e2f7da5c61a5f220ac0157f68b99e0bffd6f83599763d4bdd00473a063c44819f20b1341ae8604ea63ab0f4ae6a279004ffe46b
-
SSDEEP
6144:ESZ6xvK0kSGGic4Gct50MrABmIgxJdJOUyQsNtJUo:ElC0kS+mctnIgxc5Qs/JUo
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DeviceTracker.job 6291a2a7104ebc6e51870f803d9eb5fdd5644d2fb01fc43de1dde823c0ae7e4d.exe