Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
3fb8abfa2329b1b439a24cd564e58725.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3fb8abfa2329b1b439a24cd564e58725.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
3fb8abfa2329b1b439a24cd564e58725.exe
-
Size
257KB
-
MD5
3fb8abfa2329b1b439a24cd564e58725
-
SHA1
772ececa89e89d717c5f02d3fbf72d3b79463c6e
-
SHA256
20025bdad04835df9d24ab1295cc8b11736869937f6e73645ce3cf6570c81160
-
SHA512
971d4010487e49517c94c531a074ed361965b7c493a497250330ef57d8eea7187dbf66db6f1f39e285b8ce4880ee51dfa8cd7f8d86dd2e944ddea04ea85ba93e
-
SSDEEP
6144:UWfmrwg3v4tqoNfVQU4MN50hgjr7dHgxzfqAn4DQ:UWpgf4ooNfGU5N5WgjrBHgoY4DQ
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 3fb8abfa2329b1b439a24cd564e58725.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 3fb8abfa2329b1b439a24cd564e58725.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\HyperDock.job 3fb8abfa2329b1b439a24cd564e58725.exe