Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
78411e8ddf03c0a1f219ac6bc25c8532.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78411e8ddf03c0a1f219ac6bc25c8532.exe
Resource
win10v2004-20231215-en
General
-
Target
78411e8ddf03c0a1f219ac6bc25c8532.exe
-
Size
229KB
-
MD5
78411e8ddf03c0a1f219ac6bc25c8532
-
SHA1
37306e3b53e4d0a8bcabf958caa35032feee4149
-
SHA256
11bc1973da76a1224cafdca3b7231820b07bd9ec372a28fd6b5fe072240a07b7
-
SHA512
9a05c70d4497df719d00ac4079cd00ff4997a4bdec04f5efe9edfe087baa60cb4f4a1189586d90cf8fbaed53c5e3d79b07249e947211518e289b51df9bf57f0b
-
SSDEEP
6144:OGnm5qhB3O0RhTDkFcDv6iHk68ziipuhIR0O:Vnm5qhB3O0RhPkCDx8+YCIR0O
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 78411e8ddf03c0a1f219ac6bc25c8532.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 78411e8ddf03c0a1f219ac6bc25c8532.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Scientifix.job 78411e8ddf03c0a1f219ac6bc25c8532.exe