Analysis
-
max time kernel
143s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d.exe
Resource
win10v2004-20220812-en
General
-
Target
29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d.exe
-
Size
317KB
-
MD5
833769230720439a1d896ed724ca93e4
-
SHA1
43cd1b638163f34648949be4ff19c61356fca087
-
SHA256
29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d
-
SHA512
2563e479a091ab58880e2e6cf9a6fb6fa4c26fd9ca8a4341e4dc3feec653f152d8be9b6370ad23bc8ac62164cd33750bba549a042a6eb46c6467ad14204b19fa
-
SSDEEP
6144:GMJYS2YxK9kFVKv94DPPKm37H6HGxtj1S48sAZkiut:G2gF9kFUvWDam37aHGXj1S4bA0t
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\UserWizard.job 29e559dcce7c3052b9dd7751dbf7671690e26fdca5180dffc7fb0b133bce8e3d.exe