Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 10:34
Static task
static1
Behavioral task
behavioral1
Sample
67a4d2e63a6def406349aa93f10aa1bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67a4d2e63a6def406349aa93f10aa1bf.exe
Resource
win10v2004-20231215-en
General
-
Target
67a4d2e63a6def406349aa93f10aa1bf.exe
-
Size
256KB
-
MD5
67a4d2e63a6def406349aa93f10aa1bf
-
SHA1
efac08fc23a74b84e5ba57d664a06cde8185ed45
-
SHA256
2320362c091857ebfc219f4cbd08194e15e3655984720c7f97e55e95200004cf
-
SHA512
3e303aa8dd88c817e3b6a98640d910c24ae32ef2536878f23a4836e68d58e401c8ee62f4c808888dc0162a1785f96c42074773a4e88ba024776e6f840e8e3b1a
-
SSDEEP
6144:/tf8uIVsFCmaC1nhR+NOavnW+6vBaVwl+X:6HV3/WdJaVwl+X
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 67a4d2e63a6def406349aa93f10aa1bf.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 67a4d2e63a6def406349aa93f10aa1bf.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\TimeDime.job 67a4d2e63a6def406349aa93f10aa1bf.exe