Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
6f3d4851923cbd6fd28519156bc96bd7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f3d4851923cbd6fd28519156bc96bd7.exe
Resource
win10v2004-20231215-en
General
-
Target
6f3d4851923cbd6fd28519156bc96bd7.exe
-
Size
258KB
-
MD5
6f3d4851923cbd6fd28519156bc96bd7
-
SHA1
afa9a559170479292a158186653d807e4e043979
-
SHA256
15387a0106b9da8d12153eabf827bb6c306387059445bb4df4516b36dd7bd6f2
-
SHA512
11c26cfd989b71b6bd1b69607c350ede3ccbb26b137aa2e65522010b1f4a4cf458e1c0add5fcafe25ebdfa97b7faece6b8d962a5f02a60039aa25809ed187f71
-
SSDEEP
3072:EvcP6pi6fZbv4c9nhaWEtZA9msMG4qBMBlOreNh4s7GsPQtTpaqXIVItTXRHc7:EvcPkfVz02m5qOl2e0s6aqXSItTBHO
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6f3d4851923cbd6fd28519156bc96bd7.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 6f3d4851923cbd6fd28519156bc96bd7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FindYourKeys.job 6f3d4851923cbd6fd28519156bc96bd7.exe