General
-
Target
ae99b780c0e124851dd2358447f2421d4413ba08e08588a995ed43d0ad99f47a
-
Size
1.1MB
-
Sample
221204-wf3pnscb65
-
MD5
19b7009a6b4b70a2990be544910fc89c
-
SHA1
f58de3e1539e9533031a23193ef5b45718bab8fd
-
SHA256
ae99b780c0e124851dd2358447f2421d4413ba08e08588a995ed43d0ad99f47a
-
SHA512
0f23647d68cfb890b4ac92318c6bb701c6b0a3ccafb119601af3afe877ae1bfca0ccd5b839efe46654f2135cc893c044ae491dc7e8718cccdba03c3fbf76b105
-
SSDEEP
24576:9pzaucfNArAjuzOc2X/7aMGutOMIymshUVgrWvfxkE6c:9pzjnMju39Mx8vyfhUVgRBc
Static task
static1
Behavioral task
behavioral1
Sample
ae99b780c0e124851dd2358447f2421d4413ba08e08588a995ed43d0ad99f47a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae99b780c0e124851dd2358447f2421d4413ba08e08588a995ed43d0ad99f47a.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ae99b780c0e124851dd2358447f2421d4413ba08e08588a995ed43d0ad99f47a
-
Size
1.1MB
-
MD5
19b7009a6b4b70a2990be544910fc89c
-
SHA1
f58de3e1539e9533031a23193ef5b45718bab8fd
-
SHA256
ae99b780c0e124851dd2358447f2421d4413ba08e08588a995ed43d0ad99f47a
-
SHA512
0f23647d68cfb890b4ac92318c6bb701c6b0a3ccafb119601af3afe877ae1bfca0ccd5b839efe46654f2135cc893c044ae491dc7e8718cccdba03c3fbf76b105
-
SSDEEP
24576:9pzaucfNArAjuzOc2X/7aMGutOMIymshUVgrWvfxkE6c:9pzjnMju39Mx8vyfhUVgRBc
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-