Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:36
Behavioral task
behavioral1
Sample
03f480fd83853185997989ff2085b99f.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
03f480fd83853185997989ff2085b99f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
03f480fd83853185997989ff2085b99f.exe
-
Size
217KB
-
MD5
03f480fd83853185997989ff2085b99f
-
SHA1
9f234a04bb6a385f0d950458c203371ceaa8ae20
-
SHA256
6d9b80a0c5b5a6d6a443be1bb9474656cece5a9b10bc67ff8d3ba1fee1d35eeb
-
SHA512
43c6d2e8fde2c728f27a47c8ae718a9f680545a1963be5d627c7d10217708a086518cf1135d8772cab704fd691bfd85312ee333c2634db7197cd0c23fbd96ae5
-
SSDEEP
6144:xaW4oKdfvyIDAFVXOo29jek8Mpix2zhmD9kbyFfZcAsKIf9:xaW4xljGVXOoqa7I3IkefZvFI1
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2252-0-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 03f480fd83853185997989ff2085b99f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 03f480fd83853185997989ff2085b99f.exe