Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe
Resource
win10v2004-20220901-en
General
-
Target
4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe
-
Size
32KB
-
MD5
559c325767cfffe7882a7888119e0b97
-
SHA1
de0d3017b16cfdded267c42636ff1e61bc4aff92
-
SHA256
4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523
-
SHA512
9962333bb2163d3ad1df10e024394bd71e72eb57dea43667d8db8e424869fe3586638f8934edefdc91dc4d40835299b3d4470515ed930676b2c4abbed436b06e
-
SSDEEP
768:7/j7ugHESkNStUla9LT2aI3O45duuzEM+RYVKV66:7eaESkNSP9oO45fEJRYVM
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc 4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 4fb709ec963b7bc7469e3afd3630b91b103389649a09c4bf087526c6b8f98523.exe