General
-
Target
a1d9da8e38fb4356f507ff07b624937d0013fb89e4d7c7426425f0f2440a04a8
-
Size
1.0MB
-
Sample
221127-j9s14sfh51
-
MD5
f38ea8aec39a0d882322e709e6f148b7
-
SHA1
c896881532c5b352abae394b929ad04918065a32
-
SHA256
a1d9da8e38fb4356f507ff07b624937d0013fb89e4d7c7426425f0f2440a04a8
-
SHA512
73a36970ee55ab3065984a62c7c63157c27befaec178635f65b199120557a8a1514c8173da5d476e638ad0c0f10b2a6bbb9cea2d8ebca0c87efcc69a17c8826a
-
SSDEEP
24576:HZafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:5aANaRGRpuHetmGimZ
Static task
static1
Behavioral task
behavioral1
Sample
a1d9da8e38fb4356f507ff07b624937d0013fb89e4d7c7426425f0f2440a04a8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1d9da8e38fb4356f507ff07b624937d0013fb89e4d7c7426425f0f2440a04a8.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
a1d9da8e38fb4356f507ff07b624937d0013fb89e4d7c7426425f0f2440a04a8
-
Size
1.0MB
-
MD5
f38ea8aec39a0d882322e709e6f148b7
-
SHA1
c896881532c5b352abae394b929ad04918065a32
-
SHA256
a1d9da8e38fb4356f507ff07b624937d0013fb89e4d7c7426425f0f2440a04a8
-
SHA512
73a36970ee55ab3065984a62c7c63157c27befaec178635f65b199120557a8a1514c8173da5d476e638ad0c0f10b2a6bbb9cea2d8ebca0c87efcc69a17c8826a
-
SSDEEP
24576:HZafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:5aANaRGRpuHetmGimZ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-