Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
74edc6f31aca3e66693cd8710061c05e.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
74edc6f31aca3e66693cd8710061c05e.exe
-
Size
258KB
-
MD5
74edc6f31aca3e66693cd8710061c05e
-
SHA1
a5a86a758c0b0af1bd62b66a672440e2802ccdf5
-
SHA256
04c4d301fdfaf543e6b9a717728f59079b28e59779661ce33fc94cee3da48514
-
SHA512
7f740c812c5863193c0974df277e5b54348006aadd401210cfe3148541a21fb88a9493e075b1c0362aa55797dd005ab2b07a32c127d7c4147d34de7a777b8550
-
SSDEEP
3072:IP4aP1STT+dRaXQE6UiNLpmP5QQGPs8/+QoMtdpK10CzlPyscBZtsbc234/p:aNdS/+dos1pWQyWWMTpwlaZCg23qp
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
74edc6f31aca3e66693cd8710061c05e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 74edc6f31aca3e66693cd8710061c05e.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 74edc6f31aca3e66693cd8710061c05e.exe -
Drops file in Windows directory 1 IoCs
Processes:
74edc6f31aca3e66693cd8710061c05e.exedescription ioc process File created C:\Windows\Tasks\VoiceBook.job 74edc6f31aca3e66693cd8710061c05e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4752-3-0x0000000001530000-0x0000000001531000-memory.dmpFilesize
4KB
-
memory/4752-2-0x0000000001520000-0x0000000001521000-memory.dmpFilesize
4KB
-
memory/4752-4-0x0000000001540000-0x0000000001569000-memory.dmpFilesize
164KB
-
memory/4752-5-0x0000000001680000-0x00000000016AF000-memory.dmpFilesize
188KB
-
memory/4752-9-0x0000000001540000-0x0000000001569000-memory.dmpFilesize
164KB
-
memory/4752-12-0x00000000016F0000-0x0000000001717000-memory.dmpFilesize
156KB
-
memory/4752-18-0x0000000001540000-0x0000000001569000-memory.dmpFilesize
164KB
-
memory/4752-16-0x0000000001540000-0x0000000001569000-memory.dmpFilesize
164KB
-
memory/4752-1-0x0000000001510000-0x0000000001511000-memory.dmpFilesize
4KB
-
memory/4752-0-0x0000000001500000-0x0000000001501000-memory.dmpFilesize
4KB