Analysis
-
max time kernel
93s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 03:39
Static task
static1
Behavioral task
behavioral1
Sample
5116ef5f91e3ca667195ebab6d15b245.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
5116ef5f91e3ca667195ebab6d15b245.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5116ef5f91e3ca667195ebab6d15b245.exe
-
Size
320KB
-
MD5
5116ef5f91e3ca667195ebab6d15b245
-
SHA1
8db7531af5082a3b62bd50218021a4247c858e3f
-
SHA256
111926a46de2195d30c2b94ab042772cdbc72d8118ba71dbe5f605aa1caad6f4
-
SHA512
7c7c2b19422ad2196678dba9ec6a1b69212c5c5ac70b79ef3b034554e23437ef9c79ed917db9a324f6eb6cbac7935fef139eb306ed880a14b6e3ca68159a3978
-
SSDEEP
6144:jbrdxW4s21mPExdY3yK+/hNoypyGZgi7mKaG9cx:zy451mcY3yK6uyI9iKG9cx
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 5116ef5f91e3ca667195ebab6d15b245.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 5116ef5f91e3ca667195ebab6d15b245.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SociaLite.job 5116ef5f91e3ca667195ebab6d15b245.exe