Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe
Resource
win10v2004-20230915-en
General
-
Target
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe
-
Size
949KB
-
MD5
970b25a5d4b08da3326cae9ed1d3d6a0
-
SHA1
8ba10febec796e351b4c4f07d31100b7598db2d0
-
SHA256
2917996cbcfddf131682a0079bdecf56585ce5e763a2830b9dbcd59ae8b696dc
-
SHA512
2269f35db0c06a27600d2f943b7d439876a32c7c94a8ed30ab42bd53d67af9e30f0e46f1018d90ad2fab2a4d90e5b279e0027df92bef1a00a5fd33eff366972f
-
SSDEEP
12288:JHnmchMRsL9KpgyzvFxKVpBehwU3p35Dg:1nFMo9KphcVpBehw4g
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\I: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\K: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\T: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\R: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\Z: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\G: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\H: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\O: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\P: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\W: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\Y: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\J: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\L: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\M: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\S: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\V: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\X: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\B: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\N: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\Q: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe File opened (read-only) \??\U: 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe