Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:37
Static task
static1
Behavioral task
behavioral1
Sample
01f90b93a10ee8d152748f876d0b1ebe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f90b93a10ee8d152748f876d0b1ebe.exe
Resource
win10v2004-20231215-en
General
-
Target
01f90b93a10ee8d152748f876d0b1ebe.exe
-
Size
257KB
-
MD5
01f90b93a10ee8d152748f876d0b1ebe
-
SHA1
532310f05b0b55ca67a3e0e106c024bed10efc46
-
SHA256
12c19502af7ebf62c521a33df4f7ff74d98660f5b423227a0eacee7f45acf4c4
-
SHA512
27f47ecc7c4bcfb1f6d1c49f135aa0756f1b6f8e0d327c6d0831f18a5e8df734edbeda7f735a4b5f426427a4ec9481f1ec720d054bb77b3961f2fc0a338c73b7
-
SSDEEP
3072:ku7O9RJCItS/M42zEVt+Hz121Tgd+eUu+375YL4tz4oVrovnQkxFaSTrQN:ku7QJCI8jfY8/eUu+9m4tU0rEQ4aSTrI
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 01f90b93a10ee8d152748f876d0b1ebe.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 01f90b93a10ee8d152748f876d0b1ebe.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Electronix.job 01f90b93a10ee8d152748f876d0b1ebe.exe