Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:56
Behavioral task
behavioral1
Sample
619d1bc6e3b989c7c96282e5ca82f385.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
619d1bc6e3b989c7c96282e5ca82f385.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
619d1bc6e3b989c7c96282e5ca82f385.exe
-
Size
208KB
-
MD5
619d1bc6e3b989c7c96282e5ca82f385
-
SHA1
af15c2e6f8fc085c275427bae20443d2f237bf9b
-
SHA256
3d3eca3b473e29fe6e699b4599e3b4c8fc4858a7ebfbf0a489481cb642fff95c
-
SHA512
dada7c96e99e00a0c84066ed0031f4fd4e21a634571ce591a149fa64d36bde78f1537317cf513c2ea9ab9170623d7142308ed1a412de769ceb571cf3693a98b1
-
SSDEEP
6144:PV8/i8+EgVahXfzvmyKAvmjYX6csSonQXZShC51:si8+EgVqSDjq6hS4QXZn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2128-0-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 619d1bc6e3b989c7c96282e5ca82f385.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 619d1bc6e3b989c7c96282e5ca82f385.exe