Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
41c1e0a91e8cbba7bdc2a0572675cff7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41c1e0a91e8cbba7bdc2a0572675cff7.exe
Resource
win10v2004-20231215-en
General
-
Target
41c1e0a91e8cbba7bdc2a0572675cff7.exe
-
Size
325KB
-
MD5
41c1e0a91e8cbba7bdc2a0572675cff7
-
SHA1
15e09c8c01fcec3b85b9578e3e3203021bc0a792
-
SHA256
13d6c1bd4e138acd79c983d6e884c3f5988d8ae39c3db978335f276013b160cc
-
SHA512
3e53908f42eb15e6ced2be87b9cf5cf275032a8a9a0629b892a9de1f217b548b9e492d1e976c60d0912fd09a1bb565ccd79c7da4e59072f2fa93c661894a366c
-
SSDEEP
6144:qjEmMhzjbsz3Wsv1b51VyM94YQKRQmTYTPxLGmM:kEmM1szr1kMhRxsTlGmM
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 41c1e0a91e8cbba7bdc2a0572675cff7.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 41c1e0a91e8cbba7bdc2a0572675cff7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FunAround.job 41c1e0a91e8cbba7bdc2a0572675cff7.exe