Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
08a47a26491c4cb44f5d8df8007087f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08a47a26491c4cb44f5d8df8007087f5.exe
Resource
win10v2004-20231215-en
General
-
Target
08a47a26491c4cb44f5d8df8007087f5.exe
-
Size
258KB
-
MD5
08a47a26491c4cb44f5d8df8007087f5
-
SHA1
41b504d793a7090bc7964cddca87e68870f5f663
-
SHA256
167aba3126e07745ece63454e472d61b980f32a9088913b3c53432c0510f541f
-
SHA512
1d9221f4cbf69a591549225ef74abb65b3922f252318dde38c681b5c18e6478492792e531df0fd9c09814949e3cbe24180a4a30f3d0d90fb372b598d5cf0a97c
-
SSDEEP
3072:VcP6pi6fZbv4cojdaWEeZA9msMG4qBMBlOreNh4s7GsPQtzpaqXIVbn/5PRHW1:VcPkfVyjT2m5qOl2e0sKaqXSD5JHa
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 08a47a26491c4cb44f5d8df8007087f5.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 08a47a26491c4cb44f5d8df8007087f5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\CuriousReader.job 08a47a26491c4cb44f5d8df8007087f5.exe