Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13.exe
Resource
win10v2004-20220812-en
General
-
Target
eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13.exe
-
Size
318KB
-
MD5
213bd8b4ed4b0326aa98e1c19373717b
-
SHA1
8bdf90b2a0cb8f02bc0e1cfd1c57b7ec7729fb32
-
SHA256
eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13
-
SHA512
727431767eadeb4a228896fed69f9ee9ef84935b3fcff76fda9e799bfd226c0e0905efe6401c9a516d84ea6aaed36c4ed5bb9d3ecef7b981780dbbcc82d23405
-
SSDEEP
6144:FWVxvaLGOWwqE6y2yTF91k/7CJa2cl0ATKGcef+4+nSMjsxQ:FWV2GOn9FXc7Vlbzf+44SAsxQ
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\LifeEvents.job eef1631e3a996036e215e2b4a4546961ab19847caca0c6ade3b5979929efcb13.exe