Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:19
Static task
static1
Behavioral task
behavioral1
Sample
1431a05fad12172c0d82074f04226320.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1431a05fad12172c0d82074f04226320.exe
Resource
win10v2004-20231222-en
General
-
Target
1431a05fad12172c0d82074f04226320.exe
-
Size
260KB
-
MD5
1431a05fad12172c0d82074f04226320
-
SHA1
84e49c0ee72f1fb9d424923c6aad71532c4f7f10
-
SHA256
16114f59cd391d84f5c44796df196564f7010a796b3cf96fcaf7561f3974ba25
-
SHA512
7f87f817b3ee466580e1382efd2baf6b161d4f62df5bc1126a2230ee876adaa62ff5194dafc4c1c613a2bd1ab3c304b5e8cd6a6038d5d651dde4126f927e1492
-
SSDEEP
6144:uUqcDMUs2vCOYk6Gr6C/wLNxI9IxCeP/8wPE904EHXM:DbDsOC+6TzxCmDPE904mXM
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 1431a05fad12172c0d82074f04226320.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 1431a05fad12172c0d82074f04226320.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ThreatKills.job 1431a05fad12172c0d82074f04226320.exe