Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:50
Static task
static1
Behavioral task
behavioral1
Sample
11f8a9e1d0a7251dd804e88ee0042bbf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11f8a9e1d0a7251dd804e88ee0042bbf.exe
Resource
win10v2004-20231215-en
General
-
Target
11f8a9e1d0a7251dd804e88ee0042bbf.exe
-
Size
323KB
-
MD5
11f8a9e1d0a7251dd804e88ee0042bbf
-
SHA1
67fcacb4877dcfb67e22b0bcefc954ca497201e4
-
SHA256
b9ec311db56252719a2c313bfbb6991eec1cab5a3f56dc604e8fefe501e31032
-
SHA512
53487c3a01df7160c6be45921747d31b10b90ab65c62e7d608ec37099e6379ed893be41d5de3cde0f4473a7e11cc5352ce545ecbff062ecba75895cd5b87e349
-
SSDEEP
6144:+z65OV4bYRP4v6jxBGYdmTSn5g6NoEIOOCrtBpk:+G5C4UxSuGq+UgSvOCrvpk
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 11f8a9e1d0a7251dd804e88ee0042bbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 11f8a9e1d0a7251dd804e88ee0042bbf.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MediaCenterPro.job 11f8a9e1d0a7251dd804e88ee0042bbf.exe