Analysis
-
max time kernel
54s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
Resource
win10v2004-20221111-en
General
-
Target
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
-
Size
72KB
-
MD5
8b614c4920dc4c31a936c61d148fc00d
-
SHA1
10f50e017b001eb70627898da8b49a0b97bd14e4
-
SHA256
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117
-
SHA512
b2eb2b6f69462bc7c2f4157ad31fa36cf216aba6144f9f96925d8c746789b3f0f89ad5307a654fe0c18dbf02b0ba85e0e602af39845943196d4c546df72e0680
-
SSDEEP
768:tPwgRUmSHjgHJnF1SdUkHkrEMmrrfWSPqRNEO0YchqAtAuz:tIgRUrHjgHVfTkHvKRf0YKtA+
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 536 a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe"C:\Users\Admin\AppData\Local\Temp\a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:536