Analysis
-
max time kernel
123s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 09:22
Behavioral task
behavioral1
Sample
fila87e67429aef596a873a72a6b1e16e0d.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
fila87e67429aef596a873a72a6b1e16e0d.exe
-
Size
795KB
-
MD5
a14bf38d0b9840f4bdf60ce08fbf234c
-
SHA1
b546d3c66d193fc33355c9c08dd8641145a91ba7
-
SHA256
fb54d4de3a175466c796aa52b5299b0713547550a0d9c942f460618e816878eb
-
SHA512
739f352fb70b568b3986da8526e5d1056e06269885976407aa2caa5ba076d4db36bd18587724656aafec675aed10551ee1c821b2eacc338d6c4323d79e708476
-
SSDEEP
12288:q1+MFfYBYCCNVQ5VJ6TEzseESK6DPkTHhwKlLIzdJ4JT3SN:r8hfVQ5VHzseESCBwqIzdiJT3SN
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fila87e67429aef596a873a72a6b1e16e0d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 fila87e67429aef596a873a72a6b1e16e0d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Driver fila87e67429aef596a873a72a6b1e16e0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 fila87e67429aef596a873a72a6b1e16e0d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver fila87e67429aef596a873a72a6b1e16e0d.exe