Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
004245c6089fc03dfb10c61e81ea05cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
004245c6089fc03dfb10c61e81ea05cd.exe
Resource
win10v2004-20231222-en
General
-
Target
004245c6089fc03dfb10c61e81ea05cd.exe
-
Size
255KB
-
MD5
004245c6089fc03dfb10c61e81ea05cd
-
SHA1
0d717b6502d1331240b7a512e4af7bd8c504efde
-
SHA256
130f7d79e442416b3d379f8be9f0bf23a0e3c9a0a7f16a1dee16b81d68aef968
-
SHA512
b9eb42b300494aa357d38b9c1ed7b6b5c11ce011de48dbaecd734e383550b0dac70f768b45d86925e532abb6c433e959719a69f3cdc0b0a2813bd0e0c50da6d2
-
SSDEEP
6144:8kE+X7/jbFzs46GRWyF966fSdgewsVeMnnkunRMlE:o+rrRlv9R6dgdOesnkC2lE
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 004245c6089fc03dfb10c61e81ea05cd.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 004245c6089fc03dfb10c61e81ea05cd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\GoldenMatch.job 004245c6089fc03dfb10c61e81ea05cd.exe