Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
7267472e456088ee20551f7b3db95d18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7267472e456088ee20551f7b3db95d18.exe
Resource
win10v2004-20231215-en
General
-
Target
7267472e456088ee20551f7b3db95d18.exe
-
Size
258KB
-
MD5
7267472e456088ee20551f7b3db95d18
-
SHA1
97e9c09b418428532ee42df6b75ac9116f2de82d
-
SHA256
20f36a2e4900c5712dc6471cb18d174f4b486ecfd7aabe61c4045700e8140680
-
SHA512
346c49ac61a129c473c1b9cfa15349f6c6817b33793fa9a2b9dfcb86cd152b0eb2d90193ec3ee0081a5c2661f2576d1908c371af69a5c7b931f66979bfc3db30
-
SSDEEP
3072:oRgW9Q5KP15B7u442UE20lcV6rEGlkr6MWEBu9XUG4rFDcHVckAdkvAz:oRgKQQz1uncc8PkrQN9EG45eczkv2
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 7267472e456088ee20551f7b3db95d18.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 7267472e456088ee20551f7b3db95d18.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\EasyCrop.job 7267472e456088ee20551f7b3db95d18.exe