Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
23c3f3e93b8c1812a902c2685f0601f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23c3f3e93b8c1812a902c2685f0601f9.exe
Resource
win10v2004-20231215-en
General
-
Target
23c3f3e93b8c1812a902c2685f0601f9.exe
-
Size
258KB
-
MD5
23c3f3e93b8c1812a902c2685f0601f9
-
SHA1
e4163ffd69489cd3aadaf992649731e55d1c268f
-
SHA256
23e265bc187580932e7a75dd7cb253fa0d88e22b069e9fd1da728585150c868e
-
SHA512
f62f34b95f95dba9097d0250478f97722531cf789f8569797d6e64ffdd661af3b49a272f4b424d750df2b68d3f591afb6c13e4f591fb77e52bbc404775bd92b5
-
SSDEEP
3072:ztpk0dCvZITe5sxDkqAZEaZsd3qTGhMuIj2h+tgz1tRpkNphVGXCPfTprVnXET+:zk084e5zJr6ayhTz+Czsh9Tpr9ET+
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 23c3f3e93b8c1812a902c2685f0601f9.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 23c3f3e93b8c1812a902c2685f0601f9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ClearTasks.job 23c3f3e93b8c1812a902c2685f0601f9.exe