Analysis
-
max time kernel
185s -
max time network
265s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
31-10-2023 04:51
Static task
static1
Behavioral task
behavioral1
Sample
f404aa07ebb50ea8d714ce285b8f648487fdc7d6342240024b31faf2e007a466.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f404aa07ebb50ea8d714ce285b8f648487fdc7d6342240024b31faf2e007a466.exe
Resource
win10-20231025-en
General
-
Target
f404aa07ebb50ea8d714ce285b8f648487fdc7d6342240024b31faf2e007a466.exe
-
Size
649KB
-
MD5
17a2ac3394b1b5aac5494f4e71dd1600
-
SHA1
5c9ec6c3539d087bf31eb27d43e40b6dcbdc7a2b
-
SHA256
f404aa07ebb50ea8d714ce285b8f648487fdc7d6342240024b31faf2e007a466
-
SHA512
544d3102ec524417525303b63813ea9adbe3a881018c7d309d105826cccebf02dcf794679ddea17da3e1aeee598ddb496ecbfb6c3a381494eb663277bb03c514
-
SSDEEP
12288:gFQQHEssSitkghob0CozeNzqBIHH6hniIkxErnM99PN5VYu5p6k2ec5cszioo0ry:QbHSrCPH6k2ec5cloo0r/xa7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kernel32 = "%APPDATA%\\Driver\\Kernel32.exe" f404aa07ebb50ea8d714ce285b8f648487fdc7d6342240024b31faf2e007a466.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4980 f404aa07ebb50ea8d714ce285b8f648487fdc7d6342240024b31faf2e007a466.exe