Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
3992d7637dc90eefd6a8defebc277e96.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3992d7637dc90eefd6a8defebc277e96.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
3992d7637dc90eefd6a8defebc277e96.exe
-
Size
259KB
-
MD5
3992d7637dc90eefd6a8defebc277e96
-
SHA1
6a97d86ccbe0145d8d24f97d170bc513dd3dc764
-
SHA256
22b069c96dcbd83798798f7f75b9034d73259819abfb6db40d7d4efb243039e2
-
SHA512
1417d8b5da420a961b16974d713ecf3f46cfa505c41989ac53908d2471213edf5c8aeb68fddededa61b73571700210dcdd225ce02487019a13e74c277f212b8f
-
SSDEEP
6144:8ubEmKkqgQkep3B0GRsZY7OaKCXKub5+1mv5syE5:8u3xlQkC3B11OaKCXZk1C5syE5
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 3992d7637dc90eefd6a8defebc277e96.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 3992d7637dc90eefd6a8defebc277e96.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\CallBlockerPro.job 3992d7637dc90eefd6a8defebc277e96.exe