Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 03:04
Static task
static1
Behavioral task
behavioral1
Sample
92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe
Resource
win10v2004-20221111-en
General
-
Target
92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe
-
Size
1.3MB
-
MD5
5246f5d604717e27fe9f3c969c6d0653
-
SHA1
1fc32e3e8ee272ea3175fea25f4c8ec446f3c271
-
SHA256
92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3
-
SHA512
80e71d15c6124fbfcac3c87f877560efdbe54efe45a74ee24288378ee4e3c0761b9eaa11cd35fb92d63b0ebf0ff21e92aa22d99bff6b0c8341da2b49bb062b24
-
SSDEEP
12288:VJeDTzwJeC8EXIwmFgc9ckEUJDTwALNx/WIBi5pWeggZyBmtMQuGWSb34NCVEkm4:+3Mv4w6wkxeBjFhtINYlWEJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run 92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Boxoft Tools = "\"C:\\ProgramData\\Boxtools\\Boxofttoolbox.exe\" -autorun" 92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.