Analysis
-
max time kernel
68s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 03:55
Static task
static1
Behavioral task
behavioral1
Sample
4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d.exe
Resource
win10v2004-20220812-en
General
-
Target
4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d.exe
-
Size
332KB
-
MD5
92695bb79d0789a9eddd361c63bc20c0
-
SHA1
036681f576f170e3f4268e7090f8983ff9bd978d
-
SHA256
4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d
-
SHA512
0bce14d3d0707389a875a1fafdf452ccdbdc9808e8eb6f7e731ea8abfc3e9a11c8b82919ccfac039b3a64f6615e424328c07ef9a6c91fba59aaff842296a54f5
-
SSDEEP
6144:XJ+i72bgRlm5GUUQFJVLmhTSax02YXum5wRuUfEHa2nX6Ttm2MeAM:XJ+iSeQFJVyH1mS1MH9XV2MeAM
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FindYourFlavor.job 4e4b620b2ad84e8d62724668a6bc42b4897820d0294a09a17d27d2c6425db07d.exe