Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
0cde90aadd58a6cedf3f283d925ad78d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cde90aadd58a6cedf3f283d925ad78d.exe
Resource
win10v2004-20231222-en
General
-
Target
0cde90aadd58a6cedf3f283d925ad78d.exe
-
Size
258KB
-
MD5
0cde90aadd58a6cedf3f283d925ad78d
-
SHA1
c55f067b0b7896672f6e433b34d01ef8b78e0c35
-
SHA256
24e1e440b3c58d70a941588fb696d4e7bdf1d4946aa114b646627620acfc4dab
-
SHA512
52e83eef8f4b1a07dba2ab0a655e0487c717b16a354a69653d8ac326671d9c1f9e252f249e974411ae7f55146e4c0af2cf7b30e0bc1bc679adbdaf658fa2dbf2
-
SSDEEP
6144:n3dr+gkr/T4ZDo8QODocML+9qv94muhwVw5ro:3d9kygcGPeFhw25k
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 0cde90aadd58a6cedf3f283d925ad78d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 0cde90aadd58a6cedf3f283d925ad78d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ExpertPlanner.job 0cde90aadd58a6cedf3f283d925ad78d.exe