Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3f08ceb3bb234ab1243b4b3ffba7057f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f08ceb3bb234ab1243b4b3ffba7057f.exe
Resource
win10v2004-20231215-en
General
-
Target
3f08ceb3bb234ab1243b4b3ffba7057f.exe
-
Size
258KB
-
MD5
3f08ceb3bb234ab1243b4b3ffba7057f
-
SHA1
46c1efb33ade5fc0b0cc858c268fe83fef0f25b1
-
SHA256
23c154bb3b74b98609a4840bb018fa5140985f894d80a35796ac50882285b157
-
SHA512
8c1fddf00dfc5381a727576786e52c37ec58ac49aa5da3e21945f98e2fde0b4dc2a8f3d4b9039854cdfefa294ce3a5b0d68c9b82d1066509c0737693c1166154
-
SSDEEP
6144:0ED+gkrHXORDH8QOD4cML+9qv94mHVw5e:0EFkjwcGPeA25e
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 3f08ceb3bb234ab1243b4b3ffba7057f.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 3f08ceb3bb234ab1243b4b3ffba7057f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MagicMaps.job 3f08ceb3bb234ab1243b4b3ffba7057f.exe