Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:18
Static task
static1
Behavioral task
behavioral1
Sample
2b76eadd1e1663c6814b262c861b365c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b76eadd1e1663c6814b262c861b365c.exe
Resource
win10v2004-20231215-en
General
-
Target
2b76eadd1e1663c6814b262c861b365c.exe
-
Size
258KB
-
MD5
2b76eadd1e1663c6814b262c861b365c
-
SHA1
aee1e0f5fef752bc6ab892dff880cabf0d1b87b9
-
SHA256
2057a9f8a282031f8ffe12acbbbdaa3e473693b0a7816adbc5a2dbb904f49e61
-
SHA512
8cec4d954a0d086fe6160fcab960553d6dfa83386fbf65f6314531362b45b680226ab47123913bed594e41338416f2667faff9ea6b5c7d13a0075acc732124f0
-
SSDEEP
6144:QTqVKBiS3V07dUMCC4jaOmUku9zRKRnaZ05XdWorMK+UTLhbS:Qzi60dUBC4jaOf9sRnnFrL+UTLhbS
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 2b76eadd1e1663c6814b262c861b365c.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 2b76eadd1e1663c6814b262c861b365c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\PasswordMash.job 2b76eadd1e1663c6814b262c861b365c.exe