Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
6f309ecd2192218286f6ea11f5132c49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f309ecd2192218286f6ea11f5132c49.exe
Resource
win10v2004-20231215-en
General
-
Target
6f309ecd2192218286f6ea11f5132c49.exe
-
Size
322KB
-
MD5
6f309ecd2192218286f6ea11f5132c49
-
SHA1
3f73b661da2d74f94f3280cdb447cbc8fc0f3feb
-
SHA256
05494bf6785c71ee364d16fa2ce7e1e413cef554b8ad3bd0683eef82989d1544
-
SHA512
e71f95bd47c2e327a9f4c8f889ca03046645812f07275b0e90859f1b6944853b7ef8e958e7e5650dc91b85a4ea320528c018fc122ce4b74074f9d6bb5411f484
-
SSDEEP
6144:RKLXINcT8AJcEqBd6cPTmdfqY8n2DMAxLy7TYjwp2+eDuCWiNB:RKTzTPJGBd6cKdCY+2DTLywp+eRNB
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6f309ecd2192218286f6ea11f5132c49.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 6f309ecd2192218286f6ea11f5132c49.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SearchFunction.job 6f309ecd2192218286f6ea11f5132c49.exe