Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
48f6c7115b34d672a8cefea3561073e8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48f6c7115b34d672a8cefea3561073e8.exe
Resource
win10v2004-20231215-en
General
-
Target
48f6c7115b34d672a8cefea3561073e8.exe
-
Size
322KB
-
MD5
48f6c7115b34d672a8cefea3561073e8
-
SHA1
b72fb2bf730f23c4eb2e408e43a04eae2cdcc261
-
SHA256
2304c5bc8adc79b65ea4eb91f029143af1031b607d1721fdc7394eb57e61aa75
-
SHA512
5784605f84bb5b4b4f71c134b6c497f2a5dfbc20c218664d463eb66653332086fa5a21ab6332603cb8568c886bbc08c9c8e26d6352ae5beeae333c3dbfedcc28
-
SSDEEP
6144:E+7+zoba+zMd7MVZ1Ria9Nkz+YR7jz4UckfbGoV:CobnZrs+M7jz4ofbGA
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 48f6c7115b34d672a8cefea3561073e8.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 48f6c7115b34d672a8cefea3561073e8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\EffectiveNap.job 48f6c7115b34d672a8cefea3561073e8.exe