Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
6a545504c9f80696de339c4214990eb1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6a545504c9f80696de339c4214990eb1.exe
Resource
win10v2004-20231215-en
General
-
Target
6a545504c9f80696de339c4214990eb1.exe
-
Size
321KB
-
MD5
6a545504c9f80696de339c4214990eb1
-
SHA1
a37858ee10f9d16b2ae05cfe754b9d5153060af8
-
SHA256
24c25e73914fc4e4b8f357c4ddd99d5d1a370e8dadcf9aefa7299a1538a6b61e
-
SHA512
f283be099140990f99a6a5eb3b94cb9201ef203ae0118be9dbccaa74d3aac38ec42ff95cbb092c5f45a963a758905fd1d758179be48c45e3103df21304e050c0
-
SSDEEP
3072:ufG0bsni9Gx0ZCU4K3a2vAsvqRoAAXbsLKlbLlFbOREwcz0zBjWt1xivyXMch:ATXIUza2oN3S6SXfOhLxYxivGMs
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 6a545504c9f80696de339c4214990eb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6a545504c9f80696de339c4214990eb1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\TextraPack.job 6a545504c9f80696de339c4214990eb1.exe