Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:26
Static task
static1
Behavioral task
behavioral1
Sample
6aa80679b72c509568a3214291afb1d5.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
6aa80679b72c509568a3214291afb1d5.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
6aa80679b72c509568a3214291afb1d5.exe
-
Size
259KB
-
MD5
6aa80679b72c509568a3214291afb1d5
-
SHA1
9a2e850db0e01f8460103ca1b25f1e80c742d4da
-
SHA256
22563e2535affb397831a27274d79fddb374a7942f2a241e0efa7e737f61fc0b
-
SHA512
06387ee2a2a241d7daa9d90906cf088235c00a84cda27c272b25ea7457c205dd20838592a5538102d4a3ec83a397bff6c594aac21062b99c9461778bfd5eb74b
-
SSDEEP
6144:UR2PqmNW5G64YAdrz86CzgSBBI8zL8y/3MKzkwYcLs:UR2CmNqqrw6F+zL8y/3rztPLs
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 6aa80679b72c509568a3214291afb1d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6aa80679b72c509568a3214291afb1d5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MusicMaster.job 6aa80679b72c509568a3214291afb1d5.exe