Analysis
-
max time kernel
151s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 05:34
Static task
static1
Behavioral task
behavioral1
Sample
0856d679830b60b12b5f5359b0e824de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0856d679830b60b12b5f5359b0e824de.exe
Resource
win10v2004-20231215-en
General
-
Target
0856d679830b60b12b5f5359b0e824de.exe
-
Size
257KB
-
MD5
0856d679830b60b12b5f5359b0e824de
-
SHA1
9f913a500ce7717f8ea821e552d535923b950e27
-
SHA256
16741e00004890e768058acbf8574bb291cd3fb2cf83e1576b5161856696c232
-
SHA512
595e6d43a426c2c7c6318ed772f5dddcdaa151a2ce57bed0158afc84d86fd3ebf01fad1fe9a52d87637c6e7ae4201a614e4e2ef211aa14b3ca5fbecee7cba373
-
SSDEEP
3072:I3tpk0dCvZITe4/dkqAZE3Zsd3qTGhMuIj2h+tgz1tRpkNphVGXCPfTpIepEdTMP:ak084erJY6ayhTz+Czsh9TpIepEdTO
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 0856d679830b60b12b5f5359b0e824de.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 0856d679830b60b12b5f5359b0e824de.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\BeneFit.job 0856d679830b60b12b5f5359b0e824de.exe