Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
7d6aee830afca36af0cf8ca92c49d7fa.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7d6aee830afca36af0cf8ca92c49d7fa.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7d6aee830afca36af0cf8ca92c49d7fa.exe
-
Size
259KB
-
MD5
7d6aee830afca36af0cf8ca92c49d7fa
-
SHA1
d9c5399567f54c5c8696ec8e3b325618add8a97a
-
SHA256
05463e7b152aa0a81adec1951675e44b7c50ecdedb611365cd0b589e692963fd
-
SHA512
8f7685333444feb554a60a05887a7bf370f77605c863d8a7070b71b3ebe872fc0c43d8f75c10eedfb8d54b232d4d3b7cca8dcd409c7ed8305a170d5624d63feb
-
SSDEEP
6144:H1f3p4J7orntW1L9yM3BMO6tEjsV+wD8+O7eZjWK:Vh4lFL9D6OCuQ+Y3O7cjWK
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 7d6aee830afca36af0cf8ca92c49d7fa.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 7d6aee830afca36af0cf8ca92c49d7fa.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\RestoHopper.job 7d6aee830afca36af0cf8ca92c49d7fa.exe