Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 20:13
Static task
static1
Behavioral task
behavioral1
Sample
3a8e57d01c4151241a18034fbb0d494a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a8e57d01c4151241a18034fbb0d494a.exe
Resource
win10v2004-20231215-en
General
-
Target
3a8e57d01c4151241a18034fbb0d494a.exe
-
Size
253KB
-
MD5
3a8e57d01c4151241a18034fbb0d494a
-
SHA1
ee67cde80139774342e902544b5d2e97ea893af1
-
SHA256
204e9c2a5c68e9f62758edea89bc240b5ee44b86b000831ec9ba05c54e06e8b7
-
SHA512
50a9d786d061d89142cd1502cf9b1abf391373118c7a212ca23eefc566ad1124a091d2e4fb1f035ef9c6e0e5c8e270908087e2b16b0a2468d697161dc1c21ce2
-
SSDEEP
6144:4BYQ53mDw1VO18yH5cVQmM2ap/eK5Zz18WeO:4/mGnre//5T8WeO
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 3a8e57d01c4151241a18034fbb0d494a.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 3a8e57d01c4151241a18034fbb0d494a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\CDCopy.job 3a8e57d01c4151241a18034fbb0d494a.exe