Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
0cb0b6886fb7ab55ecfa26c01d871e99.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0cb0b6886fb7ab55ecfa26c01d871e99.exe
Resource
win10v2004-20231215-en
General
-
Target
0cb0b6886fb7ab55ecfa26c01d871e99.exe
-
Size
322KB
-
MD5
0cb0b6886fb7ab55ecfa26c01d871e99
-
SHA1
fae4a58430b6c1d8349f1b88b09a815f05afe5be
-
SHA256
12f9a56cd0feff8be667d14cdb0d5c51ea7616fee76cfc268ab413cddb200607
-
SHA512
9d29203f3b61ef857e0384c432a4fb4a9336f8d9237ed454934d7bc1de84f59067ef4f572474af9dd6cb59a6cfe1b879293e17ccc166d10f25470ffcbc988f56
-
SSDEEP
6144:CbrdxW4s21mPExdY3yK+/hNoypy11GjXMGDy9PY7:ay451mcY3yK6uyIP0XNy9PY7
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 0cb0b6886fb7ab55ecfa26c01d871e99.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 0cb0b6886fb7ab55ecfa26c01d871e99.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FSTask+.job 0cb0b6886fb7ab55ecfa26c01d871e99.exe