Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 20:50
Static task
static1
Behavioral task
behavioral1
Sample
11f8a9e1d0a7251dd804e88ee0042bbf.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
11f8a9e1d0a7251dd804e88ee0042bbf.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
11f8a9e1d0a7251dd804e88ee0042bbf.exe
-
Size
323KB
-
MD5
11f8a9e1d0a7251dd804e88ee0042bbf
-
SHA1
67fcacb4877dcfb67e22b0bcefc954ca497201e4
-
SHA256
b9ec311db56252719a2c313bfbb6991eec1cab5a3f56dc604e8fefe501e31032
-
SHA512
53487c3a01df7160c6be45921747d31b10b90ab65c62e7d608ec37099e6379ed893be41d5de3cde0f4473a7e11cc5352ce545ecbff062ecba75895cd5b87e349
-
SSDEEP
6144:+z65OV4bYRP4v6jxBGYdmTSn5g6NoEIOOCrtBpk:+G5C4UxSuGq+UgSvOCrvpk
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 11f8a9e1d0a7251dd804e88ee0042bbf.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 11f8a9e1d0a7251dd804e88ee0042bbf.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MediaCenterPro.job 11f8a9e1d0a7251dd804e88ee0042bbf.exe