Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 04:36
Behavioral task
behavioral1
Sample
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe
-
Size
423KB
-
MD5
1522b7c5e497da6783a21098b16fa9fd
-
SHA1
710640977a3444a6c80ccd3ccdcb846586356328
-
SHA256
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9eaf016eb2dac6fd6c1b8
-
SHA512
25d17615000a928dc11e24377f373a2d2bf406c4b0cfde19d42cc54c0605e5f31dd52b55c32dc0c32374795b101aff4fa4d30a75d8a6671ddb6b8a988141a1ce
-
SSDEEP
12288:amsJS4JF4LAIc+YGrlsh8I0wi/ajmCau5O9MB6:mS4JF4LAIc+YOliHiu6M
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exepid process 2932 3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe