Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
9bf3c1cb436916797f6da7908d8e7c6f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9bf3c1cb436916797f6da7908d8e7c6f.exe
Resource
win10v2004-20231222-en
General
-
Target
9bf3c1cb436916797f6da7908d8e7c6f.exe
-
Size
323KB
-
MD5
9bf3c1cb436916797f6da7908d8e7c6f
-
SHA1
0bfe1ebaf381d0ee7a9391646ed13a97d6120123
-
SHA256
1293c818ea69f46c7f453313ca22f78cda4bf364c0849ebe5410905fe4312285
-
SHA512
c4b23603e7174398d1f268e7f773bc0ceef9190a04025be7e1a07f415f8b08b0440e660e0bb78373e48280bfb2a0edea76bd01022c35ad1e4803d8702e774a2b
-
SSDEEP
6144:7z65OV4bYRP4v6jxBGYdmTSn5g61vDfFBvGm036Mv+tHO:7G5C4UxSuGq+UgmJf0KMv+tHO
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 9bf3c1cb436916797f6da7908d8e7c6f.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 9bf3c1cb436916797f6da7908d8e7c6f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\LightningDisk.job 9bf3c1cb436916797f6da7908d8e7c6f.exe