Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 10:29
Static task
static1
Behavioral task
behavioral1
Sample
675b91ce9d1ee08e820486cc8751ff21.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
675b91ce9d1ee08e820486cc8751ff21.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
675b91ce9d1ee08e820486cc8751ff21.exe
-
Size
261KB
-
MD5
675b91ce9d1ee08e820486cc8751ff21
-
SHA1
1a08daf21b075ba252ae210247a2abb58a542900
-
SHA256
142a19dc77bd3d595027a0138c036864feb92ca9fcd37b1f411441f4b5e21be3
-
SHA512
7005578365250be861b6f4d2e07ac5e1b8319a43c07f1d7da3ee3480f3a5ee97c50f2a2fa41832260c8bf6bdf3ce8dee1f1f30e1e18bb71af8cfdd77250f6a37
-
SSDEEP
6144:UfwBFWcrbL63hvXYvr5rDM+Xy4zYzgN4m26NNZV/va:XBXrKveFDi4MgN4m26f7/va
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 675b91ce9d1ee08e820486cc8751ff21.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 675b91ce9d1ee08e820486cc8751ff21.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\TeenFix.job 675b91ce9d1ee08e820486cc8751ff21.exe