Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 14:38
Static task
static1
Behavioral task
behavioral1
Sample
01941f5b1e953040f3ffda6e70b132ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01941f5b1e953040f3ffda6e70b132ec.exe
Resource
win10v2004-20231222-en
General
-
Target
01941f5b1e953040f3ffda6e70b132ec.exe
-
Size
258KB
-
MD5
01941f5b1e953040f3ffda6e70b132ec
-
SHA1
b435dec924216b5b896b4460668b1f2fc9d35d3c
-
SHA256
1544c83b8e4d5c0b20713dd11d2540a90032930d4dfeff6d4d8b72755efa9bef
-
SHA512
8c44cdf1ccca0a8f609f5c97e270975ee789aa9f1a661a64603d1aa23efde063a407f6d8482905e5e9e79e69af2c8f67a299341140950e4d06508d704b516f05
-
SSDEEP
3072:I8+g1CvAqReXVbfQEjP3BO+WSRcR1kiVf5SyL84OiaYKbekKCVc9q55BjDsmeb75:I8+gkrKDd8QODwcML+9qv94mgEaHw5k
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 01941f5b1e953040f3ffda6e70b132ec.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 01941f5b1e953040f3ffda6e70b132ec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DogBytes.job 01941f5b1e953040f3ffda6e70b132ec.exe