Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
299c21261037a9339cad73a7f6ea3b6a.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
299c21261037a9339cad73a7f6ea3b6a.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
299c21261037a9339cad73a7f6ea3b6a.exe
-
Size
261KB
-
MD5
299c21261037a9339cad73a7f6ea3b6a
-
SHA1
603c8fdca7bab0966bd5d569c25e7935bbdc37f0
-
SHA256
10132b49a382ef8b13377cbc243a0dfb400fde0f701b556a4a716b079ee3a6c3
-
SHA512
7ad09dcdc3fc3468d5ec4351477e50e4a45d55d6f1e0d656b6a28fddd10a518127bacdac55b8e82642160659e3599845fdb9d5a38a936bc85bf61e34501bf3a9
-
SSDEEP
6144:cZ7MIKfQ/OPLvqj8/ZzOYCftHXY19y8yawi9fTW:LIqqGZpCfFXW95wi9f6
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 299c21261037a9339cad73a7f6ea3b6a.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 299c21261037a9339cad73a7f6ea3b6a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FundsAssist.job 299c21261037a9339cad73a7f6ea3b6a.exe