Analysis
-
max time kernel
176s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:11
Static task
static1
Behavioral task
behavioral1
Sample
1c95dc692e12a6be0ea8fd8fc891e034.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c95dc692e12a6be0ea8fd8fc891e034.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1c95dc692e12a6be0ea8fd8fc891e034.exe
-
Size
258KB
-
MD5
1c95dc692e12a6be0ea8fd8fc891e034
-
SHA1
059b4cfeba46f6cf5cebe00c957342c6b58a5adb
-
SHA256
236ee219f02a96502cf4cbf94e960406d018fd21506113088368e7b18c71e430
-
SHA512
441e4beb9ea91efdedcff9afb4d59959aad3d0e50c6217ed5ffc0c65df6ce01e9d3a636c651072b5c7d8aa671ab475ad6462de27f4f4567f57c6677c9fed3934
-
SSDEEP
6144:/VxRVX3qSsL9qg9CRKNpFk2P/ykDE3Vvkc:/XaSsxq4CRKNpFBi3Vvkc
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 1c95dc692e12a6be0ea8fd8fc891e034.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 1c95dc692e12a6be0ea8fd8fc891e034.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\GoAccessorize.job 1c95dc692e12a6be0ea8fd8fc891e034.exe