Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 11:28
Static task
static1
Behavioral task
behavioral1
Sample
6acf1b5b117e6709d82aee3f65109f8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6acf1b5b117e6709d82aee3f65109f8e.exe
Resource
win10v2004-20231215-en
General
-
Target
6acf1b5b117e6709d82aee3f65109f8e.exe
-
Size
254KB
-
MD5
6acf1b5b117e6709d82aee3f65109f8e
-
SHA1
9a779b7ca5e6ba17bbcaa003064d87a0e457ffb4
-
SHA256
22f962df029b2ddbdb80d5beec94ac4a95d1f0a7134e6bf4e3b31cbb903f0a65
-
SHA512
b5d2464c964fd1d48d9d5aceca5ba7616a56d14745bbe51397f32f3c5e93d0695bc3029decf2494383e42f244243bee1c95624cc175a80e91ef9a2b829db78d9
-
SSDEEP
6144:8//QqCH9qpMmJ2pVxv8UaYDJkzkYtcRfljzxOok:8/QyPkVxv8qDJUkl5ljzxOok
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6acf1b5b117e6709d82aee3f65109f8e.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 6acf1b5b117e6709d82aee3f65109f8e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Navig8.job 6acf1b5b117e6709d82aee3f65109f8e.exe