Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
5490763a46da5a6638c42db744409e7c.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5490763a46da5a6638c42db744409e7c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5490763a46da5a6638c42db744409e7c.exe
-
Size
256KB
-
MD5
5490763a46da5a6638c42db744409e7c
-
SHA1
7acd81b0bd9d7dbb870141469e5c935ca7a40fa0
-
SHA256
2350a41567182e01f89cdc1a304350ee2a7f7ee55d289300bf451cb7e763a631
-
SHA512
f1525abfc4c53e473fff8d1d7fc147c9be7e2a62e91b7b171a3387962f13e1aba7377520bcaa49bbd90b4c95062da388c142155740ab23e3080ecd47e56f1bb7
-
SSDEEP
6144:0llZ3MfByN1givrt8ikCVinpx9bDoIC4KvaG7:0VcfSHjwCVEpx9QIC3yG7
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 5490763a46da5a6638c42db744409e7c.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 5490763a46da5a6638c42db744409e7c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\RadioCraze.job 5490763a46da5a6638c42db744409e7c.exe