Analysis
-
max time kernel
112s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 03:49
Static task
static1
Behavioral task
behavioral1
Sample
a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b.exe
Resource
win10v2004-20220812-en
General
-
Target
a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b.exe
-
Size
333KB
-
MD5
84525aea6d7029eb3bb21f5a5dcefe35
-
SHA1
70a08b359c923c80677d148efed0f650bbd2567c
-
SHA256
a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b
-
SHA512
1e446a3863e1097a74c2f50d62b5d24dcb6c0017b84c6e4a8ce9ceef29652fcaf73cbfa719699653a862a6e7ee6db7320a6a631c64e3260feb4e00aeb3c9c427
-
SSDEEP
6144:7sWVfKy07cmxvCM4QG/saKSPqTzO/hy2NCVIlu:7sCyB4QK7S/O/hDTlu
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\InstaFunction.job a8c879b1fb41938f1fa3ea65d532b7405f13749e2ebbdd4fe799fc3813b3ed0b.exe