Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 08:36
Static task
static1
Behavioral task
behavioral1
Sample
afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1.exe
Resource
win10v2004-20221111-en
General
-
Target
afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1.exe
-
Size
321KB
-
MD5
4f40e0d5465832b0693d802bb5a7aa74
-
SHA1
da2eb0f2f7ef8d8697f1b4190cd9fcd51afb5911
-
SHA256
afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1
-
SHA512
886ccc9e30b0bb17fcd7a9c2cbd5efd37b246da9b7f0f925b3310aeabfea81ae5f61c2b767a074ebcaa8af720df1666c72ea89bda7281db5d2cc5174b0e39236
-
SSDEEP
6144:Z3MPsFvYvWr56TPvA6zpP+rMJcs4iYUdVAmsr/dXYPt9bfS:ksFvV5+PvA6sOcCAmszOfS
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DailyDose.job afadb872ffea6a05fdc77c02316ae667e65afbcef6369f5ad7a4dede6c577ed1.exe