General
-
Target
e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca
-
Size
127KB
-
Sample
221124-wpk6zsea9s
-
MD5
e8fffe1dbe96f88c523e11d838d44fd0
-
SHA1
6fa324df92d16f17d4ee245e3d714ff2664e5a8e
-
SHA256
e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca
-
SHA512
4730e2300392daefbeaf73622ca43c63f8fe887d8c312c5cabd4ef91fe39daed0e291446176ab48935f437a0fd8e72b067fd571c8cea667c115b2f300228018d
-
SSDEEP
3072:IPNYnkG4nKytT3BIjbwC25z5N1AxDjZqMNRsEd:nBAtIjb0z5nWJvB
Static task
static1
Behavioral task
behavioral1
Sample
e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca
-
Size
127KB
-
MD5
e8fffe1dbe96f88c523e11d838d44fd0
-
SHA1
6fa324df92d16f17d4ee245e3d714ff2664e5a8e
-
SHA256
e0045f0f6a83c592ff27cd83466956224be167d9e3205dc8e80e2a98185332ca
-
SHA512
4730e2300392daefbeaf73622ca43c63f8fe887d8c312c5cabd4ef91fe39daed0e291446176ab48935f437a0fd8e72b067fd571c8cea667c115b2f300228018d
-
SSDEEP
3072:IPNYnkG4nKytT3BIjbwC25z5N1AxDjZqMNRsEd:nBAtIjb0z5nWJvB
Score10/10-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Disables taskbar notifications via registry modification
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-