Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
4ee1f21d126d693edcef493df0865de5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ee1f21d126d693edcef493df0865de5.exe
Resource
win10v2004-20231222-en
General
-
Target
4ee1f21d126d693edcef493df0865de5.exe
-
Size
253KB
-
MD5
4ee1f21d126d693edcef493df0865de5
-
SHA1
501f68aa86336f3cd31db15efdfad9312f958bf3
-
SHA256
2090e6b4838f14a0d72984cb108472ca94fc123cf6306e236d5d157c6c3178bf
-
SHA512
beac5cf35bf7f47f18d30ee4eb475884946e9c94525f3b60661ff784aa1cf44d0d224a6e545ce6261afbe1073363a2aee9456c2591095f4c6096ab3c5d1b4688
-
SSDEEP
6144:18zVKMQuqxlEeAW1a4KFAxgw45npgxEKKl/dpz2ZQehNBvki36:+pxzQ67W1HVxgxpIEKK/Pz2ZQehNJkiq
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4ee1f21d126d693edcef493df0865de5.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4ee1f21d126d693edcef493df0865de5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ModifyCommands.job 4ee1f21d126d693edcef493df0865de5.exe