Analysis
-
max time kernel
128s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2.exe
Resource
win10v2004-20221111-en
General
-
Target
2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2.exe
-
Size
2.5MB
-
MD5
61d2c297fc6f8d435dc6ea609b5a6684
-
SHA1
6fdc4a892e140be35e2bf8dd90425492d6528ddd
-
SHA256
2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2
-
SHA512
0fc382ce667287344fd449a439451902da467b49810c6a0762c59c6e3bc21d2e8cb5d2e9901760adf650fbf75b866e4d1f1941c1919fc28e5b48d5106067da46
-
SSDEEP
6144:jJwVxm5L1VFd+ACoNu8WgHG3x/pcLI4beOnE2MsETA59fgFo6:YqHhCoNu7gm3xBcL9EvPTA56o6
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Bidaily Synchronize Task[973b].job 2ac9a055272368648116012f620d1f7eb9532e0c63125e581d1c50a67a3b5dc2.exe