Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
4b227fd3f40bc6065d64ef51d83438ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b227fd3f40bc6065d64ef51d83438ea.exe
Resource
win10v2004-20231215-en
General
-
Target
4b227fd3f40bc6065d64ef51d83438ea.exe
-
Size
259KB
-
MD5
4b227fd3f40bc6065d64ef51d83438ea
-
SHA1
7d00f0cb9f691690a33bd421e829878e3bedf9c0
-
SHA256
166f4e5e5b652b7963d09b813ce9d30018e593653d45c4f2d79e6e5a7f936c49
-
SHA512
1785c9c83245084f175873ecc53b25dde8e825fe2aae7c6b2a94f7bd352af8a04355265949aa24c1069c076b53479ce77e59d27c5ad717078b42960ae4325dbb
-
SSDEEP
6144:O1f3p4J7pE0yW1L9yM34MO6tEjsV+wD8+O7ul0grxeWN:Ah4lp1L9D3OCuQ+Y3O7umoxeWN
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4b227fd3f40bc6065d64ef51d83438ea.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4b227fd3f40bc6065d64ef51d83438ea.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MotionDrive.job 4b227fd3f40bc6065d64ef51d83438ea.exe