Analysis
-
max time kernel
57s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:23
Static task
static1
Behavioral task
behavioral1
Sample
AdFind.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
AdFind.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
run.bat
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
run.bat
Resource
win10v2004-20221111-en
General
-
Target
run.bat
-
Size
13B
-
MD5
c63445a38455903301a58b7d4a537e92
-
SHA1
7487d515c1ad09e4d7c7e48fa4dc2dc5405666bf
-
SHA256
dd679686dbb331bb719b17883dc2e52f3bbd2f2b5f1d4fed3bb2dd1dd0d62206
-
SHA512
abf0a0df33705875e90d55fe23d9559afaa8e7b9d75391a2bfe2d848f6afa867dc25ae375e1e9b7e0dd12d27b26686c4a87a20fb70196d126cf6c8386f3b8059
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\E: cmd.exe