Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
991b7d1622960493c6f62990dc811f14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
991b7d1622960493c6f62990dc811f14.exe
Resource
win10v2004-20231215-en
General
-
Target
991b7d1622960493c6f62990dc811f14.exe
-
Size
258KB
-
MD5
991b7d1622960493c6f62990dc811f14
-
SHA1
70850dad8622fbd5e70231442d2064576d6a7cd4
-
SHA256
05c7167e56c09ed9d704a031dfc86bc6344f749c85a5598704ed2bfa12836ae4
-
SHA512
f42aa02fcefccdbf63e61fcb7cd01904ba8f1d4112a76f80b5521e6066c0f6a8989ac3f671aa6fd4173c31759f1950e555dfc5df66fc608e07af9cf010ed9847
-
SSDEEP
6144:TIgTwT3kvKek0KnZxidhLnipQFaeFVvib8BY:sgC3Mnkdx+h7ipmA8BY
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 991b7d1622960493c6f62990dc811f14.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 991b7d1622960493c6f62990dc811f14.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\CarHunt.job 991b7d1622960493c6f62990dc811f14.exe