Analysis
-
max time kernel
132s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe
Resource
win10v2004-20221111-en
General
-
Target
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe
-
Size
285KB
-
MD5
48f8d0a34ce28714b57072f3e1e148c0
-
SHA1
fb8fb8f52404dcd0056ca81500142b381a0acaa6
-
SHA256
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a
-
SHA512
6f5bb3aa5e3aa6bca28f742e6a2489a0d37fad403bd410e5c12ae78c2553f08230c1c561664f71892d1571017205cc054a131ea1a1906d500280e3bbe3f5f225
-
SSDEEP
6144:c7mmEfwgeIcVH0pwpMeWB/c0/C05mivbm3rP7Tx:c7zUwgeDVH0ppeW2mC05miTi77F
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exepid process 2860 b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe 2860 b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exepid process 2860 b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe"C:\Users\Admin\AppData\Local\Temp\b10e8e7ed854c3dcc261b8d520d4d47efef78828366720ee83541357a120720a.exe"1⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2860