Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:30
Static task
static1
Behavioral task
behavioral1
Sample
0a1ef59a70dcd69e653a8528481ccaeb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a1ef59a70dcd69e653a8528481ccaeb.exe
Resource
win10v2004-20231215-en
General
-
Target
0a1ef59a70dcd69e653a8528481ccaeb.exe
-
Size
764KB
-
MD5
0a1ef59a70dcd69e653a8528481ccaeb
-
SHA1
35bd319d1cff137cab89166110f632ae97f9377b
-
SHA256
5c1a62423ad800e7f9101c8065273337e4222b0c0ed7a466e195683b52eca799
-
SHA512
54d48d5db16413776522039f6fd67fcc402453e6db82e7a253feb6e7a0096dc7e1b4954a44795cebb2130fdb9e5e296b573a2c528ff429b5c935e35cb4a84e41
-
SSDEEP
12288:6DaHq4ybzJBGEa0QWDybGgVu8MBTZd0Bt7Jwmrkz7LHoxMHD6aQFOCkk2L2kQLpv:6x4ytLl+CQ7JwuY7L8zaQFpkk2azpv
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0a1ef59a70dcd69e653a8528481ccaeb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0a1ef59a70dcd69e653a8528481ccaeb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1204 0a1ef59a70dcd69e653a8528481ccaeb.exe