Analysis
-
max time kernel
132s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 16:42
Static task
static1
Behavioral task
behavioral1
Sample
065474184c0878ec8ab69a692e8a3cbe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
065474184c0878ec8ab69a692e8a3cbe.exe
Resource
win10v2004-20231215-en
General
-
Target
065474184c0878ec8ab69a692e8a3cbe.exe
-
Size
229KB
-
MD5
065474184c0878ec8ab69a692e8a3cbe
-
SHA1
f2fdf266f1bffbfd78f331e188fce0e27dfe9afb
-
SHA256
a8b354c22f87f2c3ce2fb30e3ef4ef11b9df2df7fe8f88bac9de9dde5e409e5a
-
SHA512
5fc26c4938e90ee28cdea0fb8b1e9425f8b3b9de3f97f46dd13edbe371d5388eabc2e40b707f6085073183b6fa279ee633af4d484949e07312b030a4c048e71a
-
SSDEEP
3072:jJKvhBDtseI5QLttWnHEmvZkEMU5Xujlqggqhlp0FiWcqYWZ7vVlDa:jJi1CQLXuF1MRjlqggSwFi0Rtl2
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 065474184c0878ec8ab69a692e8a3cbe.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 065474184c0878ec8ab69a692e8a3cbe.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DailFast.job 065474184c0878ec8ab69a692e8a3cbe.exe