Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
41b89a8da89bc266c01a9d5be55b2e01.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
41b89a8da89bc266c01a9d5be55b2e01.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
41b89a8da89bc266c01a9d5be55b2e01.exe
-
Size
321KB
-
MD5
41b89a8da89bc266c01a9d5be55b2e01
-
SHA1
83df271343b72a75d4a15e186bfc232a3abb5c87
-
SHA256
067dbaccc445e3d8550bf2cb065915c239a4a2dbc9598d050257497a4275f242
-
SHA512
3932fc5f795392da1819c560c7be67360200ec6e9364a45e405fa9a86a62ada9b3125148130d80ae97eb042388eaae4c448830e1ca7c553e25db3510d4744532
-
SSDEEP
6144:vF0eeDeECEcqftNa3zzhyGnjrID6BHy+fFVtYlK:vDSeh+ftg3cujrIsrmlK
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 41b89a8da89bc266c01a9d5be55b2e01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 41b89a8da89bc266c01a9d5be55b2e01.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ScheduleFast.job 41b89a8da89bc266c01a9d5be55b2e01.exe