Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
55b9a5d1df0e826a1651d7bfcb764a76.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
55b9a5d1df0e826a1651d7bfcb764a76.exe
Resource
win10v2004-20231215-en
General
-
Target
55b9a5d1df0e826a1651d7bfcb764a76.exe
-
Size
258KB
-
MD5
55b9a5d1df0e826a1651d7bfcb764a76
-
SHA1
181dd26140266f54ee7ce4d4624c3da8f3a1c686
-
SHA256
140f3764b77678418bff6c222b26e5aa590d33b9b426e1e115ef074c52295e6f
-
SHA512
a98cafbe8cd204b12ffedae8f570398763f47492eeeec41bb899005d7e5a8640dbc96747a254ad49d06333b185ac0439780f7f0c15a9af4435d3d1ece5000018
-
SSDEEP
6144:43dr+gkr/T4ZDp8QODmcML+9qv94m1QzXw5y:Ad9k/+cGPerA5y
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 55b9a5d1df0e826a1651d7bfcb764a76.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 55b9a5d1df0e826a1651d7bfcb764a76.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\PreventPopup.job 55b9a5d1df0e826a1651d7bfcb764a76.exe